Exploits
GHDB
Papers
Shellcodes
Search EDB
SearchSploit Manual
Submissions
Online Training
Stats
About Us
Search
These lock files often contain usernames of the user that has locked the file. Username harvesting can be done using this technique.