πOther Files
π― Overview
π Manual File System Searches
Basic String Searches
# Search file contents for password strings
cd c:\Users\htb-student\Documents & findstr /SI /M "password" *.xml *.ini *.txt
# Search with case-insensitive pattern
findstr /si password *.xml *.ini *.txt *.config
# Search with line numbers and file paths
findstr /spin "password" *.*
# Example output:
stuff.txt:1:password: l#-x9r11_2_GL!PowerShell Search Methods
File Extension Discovery
π Sticky Notes Database
StickyNotes File Location
PowerShell SQLite Query
Alternative Analysis Methods
π System and Application Files
Windows System Files
User Profile Files
π― HTB Academy Lab Solution
Lab Environment
Detailed Walkthrough
1. Connect via RDP
2. Navigate to PSSQLite Tools Directory
3. Set PowerShell Execution Policy
4. Import PSSQLite Module
5. Query StickyNotes Database
6. Extract bob_adm Password
π Network Share Drive Hunting
Share Enumeration
High-Value Share Locations
π οΈ Advanced Search Techniques
Recursive Pattern Matching
Binary and Database Files
β οΈ Detection & Defense
Detection Indicators
Defensive Measures
π‘ Key Takeaways
Last updated