How to check your vulnerability to credential dumping