Passwords
Last updated
Last updated
Can can contain password for insecure services.
Windows can allow user to save their password with runas.exe command.
Can be queried with:
When installing Windows on a large number of hosts, administrators may use Windows Deployment Services, which allows for a single operating system image to be deployed to several hosts through the network. These kinds of installations are referred to as unattended installations as they don't require user interaction. Such installations require the use of an administrator account to perform the initial setup, which might end up being stored in the machine in the following locations:
As part of these files, you might encounter credentials:
Searching for files that contains the word password
and also ends in either .xml
.ini
or .txt
Security Accounts Manager
Used for storing password hashes
Encrypted using key found inside the file SYSTEM
If SAM and SYSTEM is readable, it is possible to read hashes
Located at C:\Windows\System32\config
directory
Locked while windows is running.
Backup can be found at
Creddump7 can be used to fetch hashes from both the field.
Hash that start with
31d6
means that either the account has no password or the account is deactivated.
If hashes are not crackable, path-the-hash method can be used to login to the system.
pth-winexe version of the winexe can be used to perform pass-the-hash attacks
Can be found in the below location: cmd:
powershell:
Default web server in on windows installation.
Configuration is stored in web.config
, preferebly in the variable connectionstring
web.config
is stored in:
Putty can store proxy configuration in registry keys that includes cleartext authentication details.
They are stored in :