Harvesting Passwords from Source Code, Scripts, and Code Repositories

Harvesting Passwords from Source Code, Scripts, and Code Repositories

This presentation will discuss post-exploitation methods for harvesting passwords from source code, scripts, code repositories, shell history, log files, and other locations. Two new tools will be released during this presentation.

Presented by