Identity attacks explained: How adversaries steal credentials & takeover accounts