This article explains what a credential-based attack is, the typical steps this type of attack involves, and some of the common forms of credential-based attacks.