Purpose: Credential dumping involves extracting password hashes and plaintext passwords from compromised systems. These credentials can be used to gain further access to sensitive data and critical systems within the network. Tools: Common tools used for credential dumping include Mimikatz, Windows Credential Editor, and ProcDump. Impact: With these credentials, the tester can move laterally across the network, escalate privileges, and access confidential information.