🎯Pillaging

🎯 Overview

Pillaging is the systematic process of data extraction from compromised systems to gather credentials, sensitive information, and intelligence for further network access. Focus on installed applications, configuration files, browser data, clipboard content, and backup systems for maximum information yield.

πŸ“Š Data Sources for Pillaging

Primary Targets

# High-value data sources:
- Installed applications & services
- File shares & databases  
- Directory services (Active Directory)
- Certificate authorities
- Source code management servers
- Backup & monitoring systems
- Web browsers & IM clients
- History files & documents
- Network infrastructure details

Information Categories

# Types of valuable data:
- Personal information (PII)
- Corporate blueprints & intellectual property
- Credit card & financial data
- Server & infrastructure information
- Network topology & credentials
- Passwords & authentication tokens
- Previous audit reports
- User roles & privileges

πŸ’» Installed Application Enumeration

Directory-Based Discovery

Registry-Based Enumeration

πŸ”§ mRemoteNG Exploitation

Configuration File Location

Configuration File Structure

Password Decryption

πŸ“‹ Clipboard Monitoring

PowerShell Clipboard Logger

Clipboard Target Data

πŸ’Ύ Backup System Exploitation

Restic Backup System

Backup Repository Enumeration

Backup Target Analysis

🎯 HTB Academy Lab Solutions

Lab Environment Access

Lab 1: Application Identification

Lab 2: mRemoteNG Password Extraction

Lab 4: Restic Password Discovery

Lab 5: Administrator Hash Extraction

πŸ”„ Comprehensive Pillaging Strategy

Systematic Approach

Automation Tools

⚠️ Detection & Defense

Detection Indicators

Defensive Measures

πŸ’‘ Key Takeaways

  1. Systematic enumeration of installed applications reveals attack vectors

  2. mRemoteNG often stores credentials with weak/default encryption

  3. Browser cookies provide direct access to web applications

  4. Clipboard monitoring captures password manager usage

  5. Backup systems contain copies of sensitive system files

  6. Multiple data sources require comprehensive extraction strategy

  7. Automation tools essential for efficient pillaging operations


Pillaging transforms initial system access into comprehensive intelligence gathering for network expansion and objective completion.

Last updated