Credential Theft
Application Configuration Files
# Clear Text Passwords
findstr /SIM /C:"password" *.txt *.ini *.cfg *.config *.xml
# Chrome Files
gc 'C:\Users\htb-student\AppData\Local\Google\Chrome\User Data\Default\Custom Dictionary.txt' | Select-String password
# Unattend.xml
# PS History
(Get-PSReadLineOption).HistorySavePath
gc (Get-PSReadLineOption).HistorySavePath
foreach($user in ((ls C:\users).fullname)){cat "$user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt" -ErrorAction SilentlyContinue}Search File Contents for String
# Example 1
findstr /SI /M "password" *.xml *.ini *.txt
# Example 2
findstr /si password *.xml *.ini *.txt *.config
# Example 3
findstr /spin "password" *.*Search File Content (PowerShell)
Search For File Extension
Search For File Extension (PowerShell)
StickyNotes (PowerShell)
Cmdkey Saved Credentials
Browser Credentials
Mail Credentials
Lazagne Tool
SessioniGopher
WIFI Passwords
Network Capture
SCF on a File Share
Malicious Ink File
Pillaging
Installed Applications
Get Installed Programs
Discover Configuration Files
Abusing Cookies
Copy Cookies From FireFox
Extract Cookies
Copy Cookies from Chromium Based
Clipboard
Attacking Backup Servers
Check Backups
Restore Backup
Other Techniques
Always Install Elevated
Verify Enabled
Generate Malicious MSI
Execute MSI
Scheduled Tasks
Enumerating Scheduled Tasks
Mount VHDS/VMDK
Mount VMDK (Linux)
Mount VHD/VHDX (Linux)
Last updated