# Stuffing

When credentials are found (through [dumping](https://red.infiltr8.io/ad/movement/credentials/dumping) or [cracking](https://red.infiltr8.io/ad/movement/credentials/cracking) for instance), attackers can try to use them to obtain access on other accounts. This attacks can be powerful against organizations that use shared or common passwords.

This technique can be combined with [credential guessing](https://red.infiltr8.io/ad/movement/credentials/bruteforcing/broken-reference) when attackers try to operate transformations to the recovered passwords (i.e. numbers and special characters before or after, capital letters, l33tspeak, and so on). These new password lists can even be used in an additional [cracking](https://red.infiltr8.io/ad/movement/credentials/cracking) process.

[The same tools](https://red.infiltr8.io/ad/movement/credentials/bruteforcing/broken-reference) used for guessing can be used for stuffing and guessing.
