This presentation will discuss post-exploitation methods for harvesting passwords from source code, scripts, code repositories, shell history, log files, and other locations. Two new tools will be released during this presentation.
Phillippe Paquet