# Credentials

- [Dumping](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping.md): MITRE ATT\&CK™ Techniques T1003 and T1552
- [SAM & LSA secrets](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/sam-and-lsa-secrets.md): MITRE ATT\&CK™ Sub-techniques T1003.002, T1003.004 and T1003.005
- [DPAPI secrets](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/dpapi-protected-secrets.md): MITRE ATT\&CK™ Sub-technique T1555.003
- [NTDS secrets](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/ntds.md): MITRE ATT\&CK™ Sub-technique T1003.003
- [LSASS secrets](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/lsass.md): MITRE ATT\&CK™ Sub-technique T1003.001
- [DCSync](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/dcsync.md): MITRE ATT\&CK™ Sub-technique T1003.006
- [Group Policy Preferences](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/group-policies-preferences.md): MITRE ATT\&CK™ Sub-technique T1552.006
- [Network shares](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/network-shares.md)
- [Network protocols](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/network-protocols.md)
- [Web browsers](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/web-browsers.md): MITRE ATT\&CK™ Sub-technique T1555.003
- [In-memory secrets](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/passwords-in-memory.md)
- [Kerberos key list](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/kerberos-key-list.md)
- [Cached Kerberos tickets](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/cached-kerberos-tickets.md)
- [Windows Credential Manager](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/windows-credential-manager.md)
- [Local files](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/local-files.md)
- [Password managers](https://legacy.thehacker.recipes/a-d/movement/credentials/dumping/password-managers.md)
- [Cracking](https://legacy.thehacker.recipes/a-d/movement/credentials/cracking.md): MITRE ATT\&CK™ Sub-technique T1110.002
- [Bruteforcing](https://legacy.thehacker.recipes/a-d/movement/credentials/bruteforcing.md)
- [Guessing](https://legacy.thehacker.recipes/a-d/movement/credentials/bruteforcing/guessing.md): MITRE ATT\&CK™ Sub-technique T1110.001
- [Spraying](https://legacy.thehacker.recipes/a-d/movement/credentials/bruteforcing/password-spraying.md): MITRE ATT\&CK™ Sub-technique T1110.003
- [Stuffing](https://legacy.thehacker.recipes/a-d/movement/credentials/bruteforcing/stuffing.md): MITRE ATT\&CK™ Sub-technique T1110.004
- [Shuffling](https://legacy.thehacker.recipes/a-d/movement/credentials/shuffling.md): MITRE ATT\&CK™ Techniques T1003 and T1552 (kind of)
- [Impersonation](https://legacy.thehacker.recipes/a-d/movement/credentials/impersonation.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://legacy.thehacker.recipes/a-d/movement/credentials.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
