Credential Hunting
LaZagne
https://github.com/AlessandroZ/LaZagne Hunt for passwords stored in commonly used software. All modules
Decrypt domain creds (requires current users password)Snaffler
https://github.com/SnaffCon/Snaffler Will spider shares and readable directories for common credential patterns
Seatbelt
https://github.com/GhostPack/Seatbelt performs security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives. Sometimes finding creds.
Manual Approach
places we should keep in mind when credential hunting:
- Passwords in Group Policy in the SYSVOL share
- Passwords in scripts in the SYSVOL share
- Password in scripts on IT shares
- Passwords in web.config files on dev machines and IT shares
- unattend.xml
- Passwords in the AD user or computer description fields
- KeePass databases --> pull hash, crack and get loads of access.
- Found on user systems and shares
- Files such as pass.txt, passwords.docx, passwords.xlsx found on user systems, shares, Sharepoint