During red teaming engagements we often encounter database credentials in, for example, database scripts. These can be used to authenticate to databases and gain access to the data in these databases. Moreover, if the associated users are sufficiently privileged, this may yield you a nice code execution on a server…