Credential Hunting in Linux
Utilize when you have compromised a Linux Machine
π― Target Areas for Credential Hunting
Category
Examples
ποΈ Files
Finding Config Files
To find credentials within them:
π§© Databases
π Notes
βοΈ Scripts
β° Cronjobs
π SSH Keys
Private Key Search
Public Key Search
π History Files
π Logs
Memory (Live Creds)
Mimipenguin (Requires Root)
LaZagne (Extensive Source Extraction)
Browsers
Firefox Credential Storage
Decrypt with Firefox Decrypt
LaZagne for Browsers
Last updated