OS Credential Dumping
Once attackers have a presence on your system, they may dump credentials from the operating system to gain further access and perform lateral movement. Learn to detect and dump attackers in this lab-based course.
Already have an account? Sign In »

Module 1: Prophet Spider Introduction
Module 2: OS Credential Dumping
2.1What is OS Credential Dumping?
2.2Detection, Validation, and Mitigation (Lab)
Once an adversary has found their way into your environment, they will often take advantage of any credentials they grab as a hash or in plain text so they can move to an even better level of access. Although there are numerous ways to accomplish this goal, one of them is to dump credentials from the operating system or software.
Clearly, you should know how to detect this kind of activity and mitigate it so attackers can't gain such wide-ranging access.
Get the hands-on skills you need to detect and mitigate this attack in Cybrary's MITRE ATT&CK Framework courses aligned to the tactics and techniques used by the financially motivated threat group Prophet Spider. Prevent adversaries from accomplishing OS Credential Dumping tactics in your environment today.

Chris Daywalt
Security Freelancer

Matthew Mullins
Technical Manager, Red Team


Complete this entire course to earn a OS Credential Dumping Certificate of Completion