Introduction

What?

Techniques for obtaining credentials like login information, account names, and passwords by extracting credential information from a system in various locations such as clear-text files, registry, memory dumping, etc.

Why?

As a red teamer, gaining access to legitimate credentials has benefits:

  • It can give access to systems (Lateral Movement).

  • It makes it harder to detect our actions.

  • It provides the opportunity to create and manage accounts to help achieve the end goals of a red team engagement.

How?