Credential Theft
Credential hunting involves searching for sensitive information, such as usernames and passwords, within various files and system locations. Below are methods for locating credentials on Windows systems.
Searching Security Logs Using wevtutil
You can query security logs for specific user actions, such as logins or credential usage:
Example Output:
Searching for Credentials in Files
Using Command Prompt
Search for specific terms like "password" in various file types:
Flags:
/S
: Search in the current directory and all subdirectories./I
: Ignore case sensitivity./M
: Output only filenames containing the search string.
Searching within a specific user directory:
Manually searching a user's Documents folder:
Using PowerShell
To search through text files in the Documents folder:
To find files with "pass" in their names:
Searching recursively for configuration files:
Further Credential Theft
Listing Stored Credentials
To list stored usernames and passwords:
To run a command as another user and save credentials:
Retrieving Browser Credentials
Use SharpChrome to retrieve cookies and saved logins from Google Chrome:
Using Lazagne to retrieve credentials from various applications:
Extracting saved credentials from various applications using SessionGopher:
Windows AutoLogon
Windows AutoLogon allows a user to configure their system to automatically log into a specific account without entering credentials each time. The relevant registry keys can be found under HKEY_LOCAL_MACHINE
:
Example Output:
Clear-Text Password Storage in the Registry
PuTTY
Saved sessions for PuTTY can be found in the following registry location:
Viewing Saved Wireless Networks
To view saved wireless network profiles:
PowerShell Credentials
PowerShell credentials can be stored and retrieved securely for scripting purposes. They are encrypted using Data Protection API (DPAPI) and can be decrypted only by the same user on the same computer.
Example Commands:
Last updated