Credentials Dumping
Last updated
Last updated
Windows configuration files can contain stored passwords, e.g.
in the Unattended Windows Setup utility, used to mass deploy Windows on systems.
The configuration file can contain specific configurations and user account credentials
An attacker can find the configuration file left on the target after installation
The utility typically utilizes those :
C:\Windows\Panther\Unattend.xml
C:\Windows\Panther\Autounattend.xml
The stored passwords might be encoded in base64
(easily decodable).
After getting a meterpreter session or shell session follow the follwing technique:-
Manually search for the unattend.xml
file, it should be inside
C:\\Windows\\Panther
In a new terminal tab
administrator
user configured base64 password is QWRtaW5AMTIz
Save it to a new file
Decode it using the base64
tool
Test the administrator
:Admin@123root
credentials with the psexec
tool
You have gained access to the administrator account