Home Forums what type of info would be valuable for a hacker to collect post exploitation?

This topic contains 1 reply, has 2 voices, and was last updated by  Both_Income_1039 1 month, 1 week ago.

  • Author
    Posts
  • #397600

    im creating a small program to show my sisters and grandparents what a malicious hacker could collect if they had.

    ​

    stuff its already collecting:chrome,firefox,discord,brave,edge,ftp,steam,thunderbird credentials. Files that contain “banking”,”login”,”pass”,”pwd”,”crypto”,and other related words less than 500mb. ipadderess, networkinterfaces and their info such as mac address default gateway etc.cpu,gpu,ram name and info. disk space and finally privileges and windows info such as its version.

    What other stuff would be valuable to a hacker?

  • #397601

    Both_Income_1039

    the program will ofcourse be on github! after it collects it just displays the info to the user 🙂

You must be logged in to reply to this topic.