Credential Hunting in Windows
Credential hunting involves systematically searching a compromised Windows system for stored or hardcoded credentials. This technique is highly effective after gaining access to a system, especially high-value targets like an IT administrator's workstation.
Scenario
You've gained RDP access to an IT admin’s Windows 10 workstation. This user is likely involved with network management and system configurations—prime areas where credentials may be stored or cached.
Search-Centric Methodology
Modern systems and applications have built-in search functionality, and you can use this to your advantage to locate saved credentials or notes. Your searches should be informed by:
What would an IT admin do that involves credentials?
This can help you reduce guesswork and increase the efficiency of your hunt.
Key Search Terms
Use these terms in searches via GUI tools or command line utilities:
Tools & Techniques
Using Windows GUI Search
Use the Windows search bar to look for any of the key terms. This may reveal:
Saved credentials in documents
Configuration files
Shortcut links to credential stores
Lazagne
Lazagne is a tool that automates the discovery of stored credentials in:
Web browsers
FTP clients
Email clients
Dev tools, etc.
📥 Execution Example:
Optional: add -vv
to show detailed output.
💡 Output Example:
Lazagne can retrieve cleartext passwords from many applications—check LaZagne GitHub Supported Software for the full list.
Using findstr
on CLI
findstr
on CLISearch across multiple file types for keywords like "password":
This searches all files of specified types, recursively, for the keyword password
.
Valuable Locations to Search
Credential remnants may exist across many places, especially on IT admin machines:
SYSVOL
shares
Group Policy Preferences may store passwords in XML
IT shares
Scripts with hardcoded credentials
web.config
Dev servers might store DB logins here
unattend.xml
Used during Windows setup, may store plaintext passwords
AD user/computer descriptions
Sometimes include credentials
KeePass databases
Look for .kdbx
files; extract & crack master key
Shared drives / user folders
Files like pass.txt
, passwords.docx
, etc.
Final Thoughts
Always tailor your hunt based on:
System role (e.g., server vs. desktop)
User profile (e.g., IT admin vs. regular user)
Application usage
By understanding how a system is used, you improve your chances of finding critical credentials that aid lateral movement or privilege escalation.
Last updated