DevNull Notes
DevNull Notes
DevNull Notes
  • README
  • windows-privilege-escalation
    • Windows Privilege Escalation
    • Windows Version and Configuration Cheatsheet
    • Basic Windows Commands
    • Managing Files and Folder Permissions
    • Understanding the ACL Entries
    • Booting Files
    • User Management Commands
    • Service Controller Utility Commands
    • Windows Firewall Management
    • Windows Registry Commands
    • Net Services Suite
    • User Enumeration
    • Network Enumeration
    • kernel exploit
    • MS10-059
    • Password Mining
      • SAM and SYSTEM files
      • NTDS.DIR Active Directory
      • FileZilla Server Password Recovery
      • Password in Registry
      • Password stored in service
      • PowerShell Command History
      • Password in Alternate Data Stream(ADS)
      • Unattended Install Files (Cleartext Passwords)
      • Web COnfiguration Files and Sensitive Data Discovery
      • Windows File Search For Credentials and Sensitive Data
      • Finding Wi-Fi SSID and Passwords on windows
      • Extracting Passwords from Sticky Notes
    • Impersonation and Potato Attacks
      • GodPotato exploit
    • Registry Exploitation Techniques
      • AlwaysInstalledEvevated Exploitation
      • Autorun Registry Persistence
      • Service Escalation via Registry
    • Exploitable Service Misconfigurations
      • Dynamic Link Library Hijacking (DLL Hijacking)
      • Insecure Service Permissions(binPath)
      • Insecure File Permission - Service Executable Files Path
      • Unquoted Service Path Vulnerability
    • Escalation Path via Windows Subsystem for linux(WSL)
    • Escalation Via RunAs
    • Privilege Escalation via startup application
    • UAC(User Account Control) Bypass via sdclt.exe and App Path Hijak
    • Mounting VHD and VHDX
    • Post Exploitation
    • ShutDown and Reboot Options in Windows
    • syllabus
Powered by GitBook
On this page
  1. windows-privilege-escalation

Password Mining

SAM and SYSTEM filesNTDS.DIR Active DirectoryFileZilla Server Password RecoveryPassword in RegistryPassword stored in servicePowerShell Command HistoryPassword in Alternate Data Stream(ADS)Unattended Install Files (Cleartext Passwords)Web COnfiguration Files and Sensitive Data DiscoveryWindows File Search For Credentials and Sensitive DataFinding Wi-Fi SSID and Passwords on windowsExtracting Passwords from Sticky Notes
PreviousMS10-059NextSAM and SYSTEM files