One of the most sought after pieces of information a hacker or other malicious actor initially goes after, is valid login credentials. The reason for this is that valid login credentials achieve a number of different things for the attacker, such as:

• Not raising the alarm of antivirus and other security software;

• Disguising his presence as the presence of a legitimate user; and