In-memory secrets
Theory
Just like the LSASS process on Windows systems allowing for LSASS dumping, some programs sometimes handle credentials in the memory allocated to their processes, sometimes allowing attackers to dump them.
Practice
Last updated
Was this helpful?