πŸ•΅οΈFurther Credential Theft

🎯 Overview

Advanced credential theft techniques go beyond basic file searches to extract stored credentials from browsers, password managers, registry storage, saved RDP sessions, and wireless profiles. These methods target credentials stored by applications, Windows features, and user convenience configurations.

πŸ’Ύ Cmdkey Saved Credentials

Listing Stored Credentials

# List saved credentials for Terminal Services/RDP
cmdkey /list

# Example output:
Target: LegacyGeneric:target=TERMSRV/SQL01
Type: Generic
User: inlanefreight\bob

Exploiting Saved Credentials

# Use saved credentials with runas
runas /savecred /user:inlanefreight\bob "COMMAND HERE"

# RDP connections will automatically use saved credentials
# Target system: SQL01 with saved bob credentials

🌐 Browser Credentials

Chrome Credential Extraction

Detection Considerations

πŸ” Password Managers

KeePass Database Cracking

Password Manager Targeting

πŸ“§ Email Credential Mining

MailSniper for Exchange

πŸ› οΈ LaZagne - Automated Extraction

Comprehensive Credential Harvesting

LaZagne Module Categories

πŸ”§ SessionGopher

Remote Access Tool Credentials

πŸ—οΈ Registry Credential Storage

Windows AutoLogon

PuTTY Proxy Credentials

πŸ“‘ WiFi Password Extraction

Wireless Profile Enumeration

Wireless Password Retrieval

🎯 HTB Academy Lab Solutions

Lab Environment Overview

  • Various RDP credentials: jordan:HTB_@cademy_j0rdan!, htb-student:HTB_@cademy_stdnt!

  • Multiple objectives: SQL sa password, RDP credentials, vCenter password, FTP password

Lab 1: SQL sa Password (as jordan)

Lab 2: RDP User Discovery (as htb-student)

Lab 3: vCenter Password (as htb-student)

Lab 4: FTP Password (as htb-student)

πŸ”„ Advanced Techniques

Comprehensive Enumeration Strategy

Manual Registry Hunting

⚠️ Detection & Defense

Detection Indicators

Defensive Measures

πŸ’‘ Key Takeaways

  1. Multiple credential storage mechanisms exist beyond files

  2. Browser credentials are easily extractable with tools

  3. Password managers can be cracked if master passwords are weak

  4. Registry storage often contains cleartext credentials

  5. Automated tools like LaZagne provide comprehensive extraction

  6. WiFi passwords can enable lateral network access


Further credential theft techniques exploit various Windows credential storage mechanisms, providing multiple vectors for privilege escalation and lateral movement.

Last updated