Credential Dumping Part 1: A Closer Look at Vulnerabilities with Windows Authentication and Credential Management