Skip to content

Latest commit

 

History

History
28 lines (18 loc) · 602 Bytes

File metadata and controls

28 lines (18 loc) · 602 Bytes
description
Internal recon, hunting for passwords in Windows registry

Credentials in Registry

Execution

Scanning registry hives for the value password:

{% code title="attacker@victim" %}

reg query HKLM /f password /t REG_SZ /s
# or
reg query HKCU /f password /t REG_SZ /s

{% endcode %}

Observations

As a defender, you may want to monitor commandline argument logs and look for any that include req query and passwordstrings:

References

{% embed url="https://attack.mitre.org/wiki/Technique/T1214" %}