March 28, 2021

Windows/Linux Credentials Harvesting (post exploitation)

Linux and Windows operating systems and applications often store clear text, encoded or hashed credentials in files or in memory.

When gaining initial access to a machine and performing privilege escalation enumeration steps, often passwords can be found through these means and they can be used to further escalate privileges.

There are various methods to harvest credentials in order to escalate privileges, the following ones are the most common and they are always worth a try.

* [](
* [](

Also feel free to check out the rest of my blog, if you are interested in penetration testing.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.