Home Forums what type of info would be valuable for a hacker to collect post exploitation?

This topic contains 1 reply, has 2 voices, and was last updated by  Both_Income_1039 1 month, 1 week ago.

  • Author
  • #397600

    im creating a small program to show my sisters and grandparents what a malicious hacker could collect if they had.


    stuff its already collecting:chrome,firefox,discord,brave,edge,ftp,steam,thunderbird credentials. Files that contain “banking”,”login”,”pass”,”pwd”,”crypto”,and other related words less than 500mb. ipadderess, networkinterfaces and their info such as mac address default gateway etc.cpu,gpu,ram name and info. disk space and finally privileges and windows info such as its version.

    What other stuff would be valuable to a hacker?

  • #397601


    the program will ofcourse be on github! after it collects it just displays the info to the user 🙂

You must be logged in to reply to this topic.