π΅οΈFurther Credential Theft
π― Overview
Advanced credential theft techniques go beyond basic file searches to extract stored credentials from browsers, password managers, registry storage, saved RDP sessions, and wireless profiles. These methods target credentials stored by applications, Windows features, and user convenience configurations.
πΎ Cmdkey Saved Credentials
Listing Stored Credentials
# List saved credentials for Terminal Services/RDP
cmdkey /list
# Example output:
Target: LegacyGeneric:target=TERMSRV/SQL01
Type: Generic
User: inlanefreight\bobExploiting Saved Credentials
# Use saved credentials with runas
runas /savecred /user:inlanefreight\bob "COMMAND HERE"
# RDP connections will automatically use saved credentials
# Target system: SQL01 with saved bob credentialsπ Browser Credentials
Chrome Credential Extraction
Detection Considerations
π Password Managers
KeePass Database Cracking
Password Manager Targeting
π§ Email Credential Mining
MailSniper for Exchange
π οΈ LaZagne - Automated Extraction
Comprehensive Credential Harvesting
LaZagne Module Categories
π§ SessionGopher
Remote Access Tool Credentials
ποΈ Registry Credential Storage
Windows AutoLogon
PuTTY Proxy Credentials
π‘ WiFi Password Extraction
Wireless Profile Enumeration
Wireless Password Retrieval
π― HTB Academy Lab Solutions
Lab Environment Overview
Various RDP credentials:
jordan:HTB_@cademy_j0rdan!,htb-student:HTB_@cademy_stdnt!Multiple objectives: SQL sa password, RDP credentials, vCenter password, FTP password
Lab 1: SQL sa Password (as jordan)
Lab 2: RDP User Discovery (as htb-student)
Lab 3: vCenter Password (as htb-student)
Lab 4: FTP Password (as htb-student)
π Advanced Techniques
Comprehensive Enumeration Strategy
Manual Registry Hunting
β οΈ Detection & Defense
Detection Indicators
Defensive Measures
π‘ Key Takeaways
Multiple credential storage mechanisms exist beyond files
Browser credentials are easily extractable with tools
Password managers can be cracked if master passwords are weak
Registry storage often contains cleartext credentials
Automated tools like LaZagne provide comprehensive extraction
WiFi passwords can enable lateral network access
Further credential theft techniques exploit various Windows credential storage mechanisms, providing multiple vectors for privilege escalation and lateral movement.
Last updated