Unattended Install Files (Cleartext Passwords)
C:\unattend.xml
C:\Windows\Panther\Unattend.xml
C:\Windows\Panther\Unattend\Unattend.xml
C:\windows\system32\sysprep.inf
C:\Windows\System32\sysprep\sysprep.xml
This files often store local admin password or domain join credentials in cleartext or base64-encoded:
Log Files and System FIles
%SYSTEMDRIVE%\pagefile.sys - Potentially contains sensitive data in memory dumps
%WINDIE%\debug\NetSetup.log - may contain domain join credentials
%WINDIR%\iis6.log - Can Expose web app credentials or session info.
Registry Hives (Direct Hash Extraction)
%WINDIR%\repair\sam - Local user hashes
%WINDIR%\repair\system - may store LSA Secret Keys
%WINDIR%\repair\software - can store service credentials
%WINDIR%\repair\security - might hold DPAPI keys or security info
Event Logs and COnfig Files
%WINDIR%\system32\config\AppEvent.Evt
%WINDIR%\system32\config\SecEvent.Evt
%WINDIR%\system32\config\default.sav
%WINDIR%\system32\config\security.sav
%WINDIR%\system32\config\software.sav
%WINDIR%\system32\config\system.sav
Event logs might capture failed logins or successful authentication sttempts
Example with Powershell
Get-WinEvent -LogName Security | Where-Object {$_.ID -eq 4624}
Remote Management Credentisld
%WINDIR%\system32\CCM\logs*.log - May contain SSCM deploment credentials
%USERPROFILE%\ntuser.dat -Holds registry settings for the user. (most Common)
%USERPROFILE%\LocalS1\ContentIES\index.dat - Stores browser history and saved credentials.
Extract NTUSER.DAT settings:
reg load HKU\TempUser C:\Users\<username>\ntuser.dat
reg query HKU\TempUser
VNC Config Files (Saved Passwords)
dir c:*vnc.ini /s /b
dir c:*ultravnc.ini /s /b
Last updated