⚔️
Pentest CodeX
search
⌘Ctrlk
LinkedInGithub
⚔️
Pentest CodeX
  • 🏠HOME
    • About Me
  • 🛡️PENTESTING
    • RECON
    • SERVICES
    • WEB
    • OPERATIONS
    • PRIVESC
      • linux
      • windows
        • Windows Privilege Escalation Checklist
        • attacking-lsass
        • Dumping LSA secrets
        • copy-ntds.dit
        • copy-sam-database
        • Attacking active directory
        • credential-hunting
        • ntlm-pass-the-hash
        • Windows authentication process
        • credential-theft
          • always-installed-elevated
          • broswer-credentials
          • config-file-search
          • Windows Credential Hunting
          • credential-hunting
          • Check User/computer description fields
          • dpapi-creds
          • Network shares & mount virtual hard disks
          • other-files
          • Enum password manager (keepass hashes)
          • pillaging
          • powershell-history
          • Clear-text password stored in the registry
          • Enum remote access credentials
          • saved-credentials
          • sticky-notes
          • Enum terminal credentials
          • Unattended installation files
          • Enum Wi-Fi credentials
        • group-privileges
        • information-gathering
        • os
        • recon
        • user-privileges
    • ACTIVE DIRECTORY
  • ⚒️COURSES
    • CPTS
    • OSCP
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. 🛡️PENTESTINGchevron-right
  2. PRIVESCchevron-right
  3. windows

credential-theft

always-installed-elevatedchevron-rightbroswer-credentialschevron-rightconfig-file-searchchevron-rightWindows Credential Huntingchevron-rightcredential-huntingchevron-rightCheck User/computer description fieldschevron-rightdpapi-credschevron-rightNetwork shares & mount virtual hard diskschevron-rightother-fileschevron-rightEnum password manager (keepass hashes)chevron-rightpillagingchevron-rightpowershell-historychevron-rightClear-text password stored in the registrychevron-rightEnum remote access credentialschevron-rightsaved-credentialschevron-rightsticky-noteschevron-rightEnum terminal credentialschevron-rightUnattended installation fileschevron-rightEnum Wi-Fi credentialschevron-right
PreviousWindows authentication processchevron-leftNextalways-installed-elevatedchevron-right

Last updated 21 hours ago