PaulDotCom mailing list archives

what files do you go for when you compromise a machine?


From: dninja at gmail.com (Robin Wood)
Date: Tue, 2 Feb 2010 21:48:38 +0000

I'm sure everyone has a set of files they look for when they get
access to a box. For example, I like to look through all the "My
Documents" and Desktop directories to see if there is anything useful
in there, I would also look for .pst files.

I'm thinking of creating a Metasploit module, similar to winenum,
which will search the compromised machine for these files or check the
specified directories so having a good base list to start with would
be useful.

Any suggestions?

Robin


Current thread: