now there are a lot of interesting files out there like
Good targets:
install, backup, .bak, .log, .bat, .cmd, .vbs, .cnf, .conf, .config, .ini, .xml, .txt, .gpg, .pgp, .p12, .der, .csr, .cer, id_rsa, id_dsa, .ovpn, .rdp, vnc, ftp, ssh, vpn, git, .kdbx, .db
unattend.xml
Unattended.xml
sysprep.inf
sysprep.xml
VARIABLES.DAT
setupinfo
setupinfo.bak
web.config
SiteList.xml
.aws\\credentials
.azure\\accessTokens.json
.azure\\azureProfile.json
gcloud\\credentials.db
gcloud\\legacy_credentials
gcloud\\access_tokens.db
now let’s try it
type cdirs.txt | findstr /i unattend.xml

and we got a hit so let’s go and reveal it’s content
type c:\\Windows\\Panther\\unattend.xml | findstr /i passw

and we got the password again
another one
type cdirs.txt | findstr /i vnc

and we got another hit let’s now open the file
type c:\\Users\\IEUser\\Downloads\\ultravnc.ini | findstr /i passw

and we got 2 encoded passwords