π―Pillaging
π― Overview
Pillaging is the systematic process of data extraction from compromised systems to gather credentials, sensitive information, and intelligence for further network access. Focus on installed applications, configuration files, browser data, clipboard content, and backup systems for maximum information yield.
π Data Sources for Pillaging
Primary Targets
# High-value data sources:
- Installed applications & services
- File shares & databases
- Directory services (Active Directory)
- Certificate authorities
- Source code management servers
- Backup & monitoring systems
- Web browsers & IM clients
- History files & documents
- Network infrastructure detailsInformation Categories
# Types of valuable data:
- Personal information (PII)
- Corporate blueprints & intellectual property
- Credit card & financial data
- Server & infrastructure information
- Network topology & credentials
- Passwords & authentication tokens
- Previous audit reports
- User roles & privilegesπ» Installed Application Enumeration
Directory-Based Discovery
Registry-Based Enumeration
π§ mRemoteNG Exploitation
Configuration File Location
Configuration File Structure
Password Decryption
πͺ Browser Cookie Extraction
Firefox Cookie Extraction
Chrome Cookie Extraction
Cookie Abuse for IM Access
π Clipboard Monitoring
PowerShell Clipboard Logger
Clipboard Target Data
πΎ Backup System Exploitation
Restic Backup System
Backup Repository Enumeration
Backup Target Analysis
π― HTB Academy Lab Solutions
Lab Environment Access
Lab 1: Application Identification
Lab 2: mRemoteNG Password Extraction
Lab 3: Slack Cookie Extraction
Lab 4: Restic Password Discovery
Lab 5: Administrator Hash Extraction
π Comprehensive Pillaging Strategy
Systematic Approach
Automation Tools
β οΈ Detection & Defense
Detection Indicators
Defensive Measures
π‘ Key Takeaways
Systematic enumeration of installed applications reveals attack vectors
mRemoteNG often stores credentials with weak/default encryption
Browser cookies provide direct access to web applications
Clipboard monitoring captures password manager usage
Backup systems contain copies of sensitive system files
Multiple data sources require comprehensive extraction strategy
Automation tools essential for efficient pillaging operations
Pillaging transforms initial system access into comprehensive intelligence gathering for network expansion and objective completion.
Last updated