Adversaries may search compromised systems to find and obtain insecurely stored credentials. Tactics TA0006 Sub-techniques T1552.001 T1552.002 T1552.003 T1552.004 T1552.005 T1552.006 T1552.007 T1552.008 See: MITRE ATT&CK