DevNull Notes
CtrlK
DevNull Notes
DevNull Notes
  • README
  • OSCP CheatSheet
    • Scanning
  • windows-privilege-escalation
    • Windows Privilege Escalation
    • Windows Version and Configuration Cheatsheet
    • Basic Windows Commands
    • Managing Files and Folder Permissions
    • Understanding the ACL Entries
    • Booting Files
    • User Management Commands
    • Service Controller Utility Commands
    • Windows Firewall Management
    • Windows Registry Commands
    • Net Services Suite
    • User Enumeration
    • Network Enumeration
    • kernel exploit
    • MS10-059
    • Password Mining
      • SAM and SYSTEM files
      • NTDS.DIR Active Directory
      • FileZilla Server Password Recovery
      • Password in Registry
      • Password stored in service
      • PowerShell Command History
      • Password in Alternate Data Stream(ADS)
      • Unattended Install Files (Cleartext Passwords)
      • Web COnfiguration Files and Sensitive Data Discovery
      • Windows File Search For Credentials and Sensitive Data
      • Finding Wi-Fi SSID and Passwords on windows
      • Extracting Passwords from Sticky Notes
    • Impersonation and Potato Attacks
      • GodPotato exploit
    • Registry Exploitation Techniques
      • AlwaysInstalledEvevated Exploitation
      • Autorun Registry Persistence
      • Service Escalation via Registry
    • Exploitable Service Misconfigurations
      • Dynamic Link Library Hijacking (DLL Hijacking)
      • Insecure Service Permissions(binPath)
      • Insecure File Permission - Service Executable Files Path
      • Unquoted Service Path Vulnerability
    • Escalation Path via Windows Subsystem for linux(WSL)
    • Escalation Via RunAs
    • Privilege Escalation via startup application
    • UAC(User Account Control) Bypass via sdclt.exe and App Path Hijak
    • Mounting VHD and VHDX
    • Post Exploitation
    • ShutDown and Reboot Options in Windows
    • syllabus
  • Active Directory
    • Access Control Model
    • Ligolo-ng
    • Chisel
    • LDAP Enumeration
    • BloodHound
    • PowerView
    • PowerHuntShares
    • Kerberos Enumeration
    • Kerberos Attack
    • Impacket-GetNPUsers
    • Impacket-GetUserSPNs
    • Kerberoasting User Enumeration
    • NetBIOS and LLMNR Name poisioning
    • smbpasswd
    • AS-REP Roasting Attack
    • Kerberoasting v/s AS-REP
    • SMB relay attack
    • NetExec
    • Mimikatz usage and Execution
    • Kerberoasting with Mimikatz
    • Golden Ticket
    • Silver ticket
Powered by GitBook
On this page
  1. windows-privilege-escalation

Password Mining

SAM and SYSTEM filesNTDS.DIR Active DirectoryFileZilla Server Password RecoveryPassword in RegistryPassword stored in servicePowerShell Command HistoryPassword in Alternate Data Stream(ADS)Unattended Install Files (Cleartext Passwords)Web COnfiguration Files and Sensitive Data DiscoveryWindows File Search For Credentials and Sensitive DataFinding Wi-Fi SSID and Passwords on windowsExtracting Passwords from Sticky Notes
PreviousMS10-059NextSAM and SYSTEM files