To find passwords or private keys written plainly in files, like a note with a password left on a table by someone forgetful.
On bounty targets, employees save passwords in config files or command history, like a diary where they write secrets; the attacker searches and uses them to go deeper.
Search in PowerShell history:
Bash
type C:\\Users\\USER\\AppData\\Roaming\\Microsoft\\Windows\\PowerShell\\PSReadLine\\ConsoleHost_history.txt
Search in registry:
Bash
reg query HKLM /f password /t REG_SZ /s
To find local databases with passwords or connections, like a treasure box full of keys.
On bounty, apps save passwords in .db or .xml files; the attacker reads them to access other systems, like a thief finding a map to the safe.