Vulnerability scanners using password-based auth can leak credentials and enable lateral movement. Learn risks, attack techniques, and hardening steps.| Praetorian