Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. Credentials can then be used to perform Lateral Movement and access restricted information.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.