Credentials Dumping
Passwords Configuration Files
Windows configuration files can contain stored passwords, e.g. in the Unattended Windows Setup utility, used to mass deploy Windows on systems.
The configuration file can contain specific configurations and user account credentials
An attacker can find the configuration file left on the target after installation
The utility typically utilizes those files:
C:\Windows\Panther\Unattend.xml
C:\Windows\Panther\Autounattend.xml
The stored passwords might be encoded in
base64(easily decodable).
#Exploitation
After getting a meterpreter session or shell session follow the follwing technique:-
Manually search for the
unattend.xmlfile, it should be insideC:\\Windows\\Panther
cd C:\\Windows\\Panther
dir
download unattend.xml
In a new terminal tab

Get Access
administratoruser configured base64 password isQWRtaW5AMTIzSave it to a new file
Decode it using the
base64tool

Test the
administrator:Admin@123rootcredentials with thepsexectool
You have gained access to the administrator account
Last updated