Credetial Hunting
Credential Hunting
Application Configuration Files
PS C:\> findstr /SIM /C:"password" *.txt *.ini *.cfg *.config *.xmlDictionary Files
PS C:\htb> gc 'C:\Users\htb-student\AppData\Local\Google\Chrome\User Data\Default\Custom Dictionary.txt' | Select-String password
Password1234!Unattended Installation Files
<?xml version="1.0" encoding="utf-8"?>
<unattend xmlns="urn:schemas-microsoft-com:unattend">
<settings pass="specialize">
<component name="Microsoft-Windows-Shell-Setup" processorArchitecture="amd64" publicKeyToken="31bf3856ad364e35" language="neutral" versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<AutoLogon>
<Password>
<Value>local_4dmin_p@ss</Value>
<PlainText>true</PlainText>
</Password>
<Enabled>true</Enabled>
<LogonCount>2</LogonCount>
<Username>Administrator</Username>
</AutoLogon>
<ComputerName>*</ComputerName>
</component>
</settings>PowerShell History File
PowerShell Credentials
Other Files
Manually Searching the File System for Credentials
Sticky Notes Passwords
Other Files of Interest
Further Credential Theft
Cmdkey Saved Credentials
Browser Credentials
Password Managers
More Fun with Credentials
Even More Fun with Credentials
Clear-Text Password Storage in the Registry
Putty
Wifi Passwords
Last updated