Credetial Hunting

Credential Hunting

Application Configuration Files

Searching for Files

PS C:\> findstr /SIM /C:"password" *.txt *.ini *.cfg *.config *.xml

Dictionary Files

Chrome Dictionary Files

PS C:\htb> gc 'C:\Users\htb-student\AppData\Local\Google\Chrome\User Data\Default\Custom Dictionary.txt' | Select-String password

Password1234!

Unattended Installation Files

<?xml version="1.0" encoding="utf-8"?>
<unattend xmlns="urn:schemas-microsoft-com:unattend">
    <settings pass="specialize">
        <component name="Microsoft-Windows-Shell-Setup" processorArchitecture="amd64" publicKeyToken="31bf3856ad364e35" language="neutral" versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
            <AutoLogon>
                <Password>
                    <Value>local_4dmin_p@ss</Value>
                    <PlainText>true</PlainText>
                </Password>
                <Enabled>true</Enabled>
                <LogonCount>2</LogonCount>
                <Username>Administrator</Username>
            </AutoLogon>
            <ComputerName>*</ComputerName>
        </component>
    </settings>

PowerShell History File

Confirming PowerShell History Save Path

Reading PowerShell History File

PowerShell Credentials

Decrypting PowerShell Credentials

Other Files

Manually Searching the File System for Credentials

Sticky Notes Passwords

Looking for StickyNotes DB Files

Podemos copiar los tres archivos plum.sqlite* a nuestro sistema y abrirlos con una herramienta como DB Browser for SQLite y ver la columna Text en la tabla Note con la consulta select Text from Note;.

Viewing Sticky Notes Data Using PowerShell

Strings to View DB File Contents

Other Files of Interest

Other Interesting Files

Further Credential Theft

Cmdkey Saved Credentials

Listing Saved Credentials

Run Commands as Another User

Browser Credentials

Password Managers

Extracting KeePass Hash

Cracking Hash Offline

Email

More Fun with Credentials

Viewing LaZagne Help Menu

Running All LaZagne Modules

Even More Fun with Credentials

Running SessionGopher as Current User

Clear-Text Password Storage in the Registry

Windows AutoLogon

Enumerating Autologon with reg.exe

Putty

Enumerating Sessions and Finding Credentials:

Wifi Passwords

Viewing Saved Wireless Networks

Retrieving Saved Wireless Passwords

Last updated