method_5_post-exploitation
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
method_5_post-exploitation [2023/01/12 00:16] – gman | method_5_post-exploitation [2023/01/12 00:31] (current) – [First Thing] gman | ||
---|---|---|---|
Line 33: | Line 33: | ||
* Concealment | * Concealment | ||
* Retain Access | * Retain Access | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== First Thing ===== | ||
+ | |||
+ | After you've compromised a system, one of the //**first things**// you want to try is acquiring the local credential store (passwords). | ||
+ | |||
+ | **Windows: | ||
+ | |||
+ | **Linux:** The '' | ||
+ | - '' | ||
+ | - '' | ||
+ | - '' | ||
+ | |||
+ | Linux passwords are usually found in ''/ | ||
+ | * You can simply copy that file to your attack machine and crack offline (if you have root). | ||
+ | * Therefore, priv esc is a key part of acquiring credentials. | ||
---- | ---- | ||
Line 216: | Line 233: | ||
===== Windoze ===== | ===== Windoze ===== | ||
+ | ==== LSA Secrets Registry ==== | ||
+ | |||
+ | The **LSA Secrets Registry** contains the password of the currently logged-in user in an encrypted form. | ||
+ | * You can find the LSA Secrets Registry here: '' | ||
+ | * You can find the encryption key to the user's password in the parent directory: '' | ||
+ | So, if you have admin access to the Windows Registry, you can recover the encrypted password and its key fairly easily. |
method_5_post-exploitation.1673482616.txt.gz · Last modified: by gman