π―Pillaging
π― Overview
π Data Sources for Pillaging
Primary Targets
# High-value data sources:
- Installed applications & services
- File shares & databases
- Directory services (Active Directory)
- Certificate authorities
- Source code management servers
- Backup & monitoring systems
- Web browsers & IM clients
- History files & documents
- Network infrastructure detailsInformation Categories
# Types of valuable data:
- Personal information (PII)
- Corporate blueprints & intellectual property
- Credit card & financial data
- Server & infrastructure information
- Network topology & credentials
- Passwords & authentication tokens
- Previous audit reports
- User roles & privilegesπ» Installed Application Enumeration
Directory-Based Discovery
Registry-Based Enumeration
π§ mRemoteNG Exploitation
Configuration File Location
Configuration File Structure
Password Decryption
πͺ Browser Cookie Extraction
Firefox Cookie Extraction
Chrome Cookie Extraction
Cookie Abuse for IM Access
π Clipboard Monitoring
PowerShell Clipboard Logger
Clipboard Target Data
πΎ Backup System Exploitation
Restic Backup System
Backup Repository Enumeration
Backup Target Analysis
π― HTB Academy Lab Solutions
Lab Environment Access
Lab 1: Application Identification
Lab 2: mRemoteNG Password Extraction
Lab 3: Slack Cookie Extraction
Lab 4: Restic Password Discovery
Lab 5: Administrator Hash Extraction
π Comprehensive Pillaging Strategy
Systematic Approach
Automation Tools
β οΈ Detection & Defense
Detection Indicators
Defensive Measures
π‘ Key Takeaways
Last updated