Windows Credential Hunting
Application Configuration Files
findstr /SIM /C:"password" *.txt *.ini *.cfg *.config *.xmlDictionary Files
gc 'C:\Users\htb-student\AppData\Local\Google\Chrome\User Data\Default\Custom Dictionary.txt' | Select-String passwordUnattended Installation Files
<?xml version="1.0" encoding="utf-8"?>
<unattend xmlns="urn:schemas-microsoft-com:unattend">
<settings pass="specialize">
<component name="Microsoft-Windows-Shell-Setup" processorArchitecture="amd64" publicKeyToken="31bf3856ad364e35" language="neutral" versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<AutoLogon>
<Password>
<Value>local_4dmin_p@ss</Value>
<PlainText>true</PlainText>
</Password>
<Enabled>true</Enabled>
<LogonCount>2</LogonCount>
<Username>Administrator</Username>
</AutoLogon>
<ComputerName>*</ComputerName>
</component>
</settings>PowerShell History File
PowerShell Credentials
Manually Searching the File System for Credentials
Sticky Notes Passwords
Other Files of Interest
Further Credential Theft
Cmdkey Saved Credentials
Browser Credentials
Copy Firefox Cookies Database
Password Managers
Email
When all else fails
Wifi Passwords
Citrix Breakout
Traffic Capture
Monitoring for Process Command Lines
Search Windows Registry for key
Capturing Hashes with a Malicious .lnk File
Pillaging
Extracting Clipboard data
Search entire windows for a file
Last updated
