Cred Hunting
First part is big bunch of commands from cmd and powershell. Want more delailed info? Use AI. And second big part is just a lot of different techniques and tools. Happy Hunting)
CMD
# Search file
C:\> findstr /s /i flag n:\*.*
C:\> dir n:\*flag* /s /
# Search for Strings within Files
C:\> findstr /si password *.xml *.ini *.txt *.config
C:\> findstr /spin "password" *.*
C:\> cd c:\Users\rio\Documents & findstr /SI /M "password" *.xml *.ini *.txt
C:\> findstr /SIM /C:"password" *.txt *.ini *.cfg *.config *.xml *.git *.ps1 *.yml
# Search for File Extensions
C:\> dir /S /B *pass*.txt == *pass*.xml == *pass*.ini == *cred* == *vnc* == *.config*
C:\> where /R C:\ *.configPOWERsHELL
# Searching for Files (by Name or Pattern)
PS C:\> Get-ChildItem -Recurse -Path N:\ -Include *flag* -File
PS C:\> Get-ChildItem C:\ -Recurse -Include *.rdp, *.config, *.vnc, *.cred -ErrorAction Ignore
#$ Searching for strings within files
PS C:\> Get-ChildItem -Recurse -Path C:\ | Select-String "flag" -List
PS C:\> Select-String -Path C:\Users\rio\Documents\*.txt -Pattern passwordPowershell History File
Powershell Credentials
SAM Registry Hives Copy
Registry Hive
Description
Running secretsdump.py
Remote Dumping
Dumping LSA Secrets Remotely
Dumping SAM Remotely
Dumping NTDS.dit Remotely
LSASS Dumping
Shadow Copy of C:
NTDS.dit
Cmdkey Saved Credentials
Listing Saved Credentials:
Browser Credentials
Retrieving Saved Credentials from Chrome
Password Managers
Extracting KeePass Hash:
Cracking KeePass Hash with Hashcat:
LaZagne
Run all modules:
SessionGopher
Running SessionGopher [LINK]
Windows Registry
Windows AutoLogon
PuTTY Saved Credentials
WiFi Passwords
Listing Saved Wireless Networks:
Retrieving Saved Wireless Passwords:
COOKIES
Firefox
Copy Firefox Cookies Database
Extract cookies from database
Chrome
Invoke-SharpChromium
CLIPBOARD
INTERESTING FILES
Last updated