260
◾
Ethical Hacking and Penetration Testing Guide
The common type of data that we would be looking for would be stored e-mails and pass-
words, customer contracts, information about the systems, and any other confidential data.
Our common targets would be file servers, home directories, shared drives, databases, etc. We
will talk about utilizing meterpreter scripts to enumerate confidential data from the remote
machine.
Dostları ilə paylaş: