Step 1: Identify Target: The attacker identifies a system running a vulnerable version of the BackWeb client.
Step 2: Access the Registry: The attacker gains local access to the target system, either through physical access, compromised user account, or other local vulnerability.
Step 3: Locate the Registry Key: The attacker navigates to the HKEY_CURRENT_USER\Software\BackWeb\Communication registry key.
Step 4: Read Credentials: The attacker reads the Username and Password values stored in cleartext within the Communication key.
Step 5: Utilize Credentials: The attacker uses the retrieved username and password to authenticate to the proxy server, potentially gaining access to network resources or sensitive information.