Skip to content

Dumping

When gaining control of a computer or account, useful information can often be obtained, sometimes leading to the compromise of additional objects. Many techniques can be carried out for credential dumping (either in the form of plaintext passwords, hashed passwords, or tickets).