πOther Files
π― Overview
Advanced file system searching reveals credentials in unexpected locations beyond standard configuration files. This includes StickyNotes databases, network share drives, system backup files, and various application-specific storage locations. Manual search techniques complement automated enumeration tools.
π Manual File System Searches
Basic String Searches
# Search file contents for password strings
cd c:\Users\htb-student\Documents & findstr /SI /M "password" *.xml *.ini *.txt
# Search with case-insensitive pattern
findstr /si password *.xml *.ini *.txt *.config
# Search with line numbers and file paths
findstr /spin "password" *.*
# Example output:
stuff.txt:1:password: l#-x9r11_2_GL!PowerShell Search Methods
File Extension Discovery
π Sticky Notes Database
StickyNotes File Location
PowerShell SQLite Query
Alternative Analysis Methods
π System and Application Files
Windows System Files
User Profile Files
π― HTB Academy Lab Solution
Lab Environment
Target:
10.129.223.93(ACADEMY-WINLPE-WS01)Credentials:
htb-student:HTB_@cademy_stdnt!Objective: Find cleartext password for bob_adm user
Access Method: xfreerdp
Primary Method: StickyNotes SQLite database analysis
Detailed Walkthrough
1. Connect via RDP
2. Navigate to PSSQLite Tools Directory
3. Set PowerShell Execution Policy
4. Import PSSQLite Module
5. Query StickyNotes Database
6. Extract bob_adm Password
π Network Share Drive Hunting
Share Enumeration
High-Value Share Locations
π οΈ Advanced Search Techniques
Recursive Pattern Matching
Binary and Database Files
β οΈ Detection & Defense
Detection Indicators
Defensive Measures
π‘ Key Takeaways
StickyNotes databases often contain plaintext credentials
System backup files may contain registry copies with credentials
Network shares frequently store sensitive documents
Manual searching complements automated enumeration tools
Multiple file types should be examined systematically
PowerShell provides powerful search capabilities for credential hunting
Advanced file system credential hunting extends beyond standard configuration files to reveal credentials in unexpected locations throughout Windows systems.
Last updated