Credentials
Last updated
Was this helpful?
Last updated
Was this helpful?
Enumerate AD using PowerShell, .Net, and Python tools.
Find interesting information like delegation issues, credentials in clear text, etc.
Enumerate and abuse Restricted Groups.
Once we elevated access to at least one target machine, we can go ahead and extract credentials from it.
A non-exhaustive list of locations on a Windows machine we can extract credentials from
– Memory of the lsass process
– LSASecrets
– SAM
– Credential Vault
– Unattend.xml and sysprep.xml
– Autologon credentials
– PowerShell console history
LSASecrets
SAM
Credential Vault
Unattend.xml
sysprep.xml
Autologon credentials
PowerShell console history
Lsass Memory
Domain users, service accounts, clear text