π΅οΈFurther Credential Theft
π― Overview
πΎ Cmdkey Saved Credentials
Listing Stored Credentials
# List saved credentials for Terminal Services/RDP
cmdkey /list
# Example output:
Target: LegacyGeneric:target=TERMSRV/SQL01
Type: Generic
User: inlanefreight\bobExploiting Saved Credentials
# Use saved credentials with runas
runas /savecred /user:inlanefreight\bob "COMMAND HERE"
# RDP connections will automatically use saved credentials
# Target system: SQL01 with saved bob credentialsπ Browser Credentials
Chrome Credential Extraction
Detection Considerations
π Password Managers
KeePass Database Cracking
Password Manager Targeting
π§ Email Credential Mining
MailSniper for Exchange
π οΈ LaZagne - Automated Extraction
Comprehensive Credential Harvesting
LaZagne Module Categories
π§ SessionGopher
Remote Access Tool Credentials
ποΈ Registry Credential Storage
Windows AutoLogon
PuTTY Proxy Credentials
π‘ WiFi Password Extraction
Wireless Profile Enumeration
Wireless Password Retrieval
π― HTB Academy Lab Solutions
Lab Environment Overview
Lab 1: SQL sa Password (as jordan)
Lab 2: RDP User Discovery (as htb-student)
Lab 3: vCenter Password (as htb-student)
Lab 4: FTP Password (as htb-student)
π Advanced Techniques
Comprehensive Enumeration Strategy
Manual Registry Hunting
β οΈ Detection & Defense
Detection Indicators
Defensive Measures
π‘ Key Takeaways
Last updated