📖
Building a Windows AD lab
  • Building a Windows AD lab
  • Lab-setup
    • Lab overview
    • Building the lab
      • Prerequisite
      • Creating images
        • Optional: Install software & Settings
      • Network setup
      • Cloning & Creating VM's
      • Creating bank.local
        • Creating Domain Controller - DC01
          • Enable RDP
        • Creating amsterdam.bank.local
          • Creating Domain Controller - DC02
            • Creating a AD structure
            • Create a CA
            • Configure LDAPS
          • Creating Fileserver - FILE01
            • File services
          • Creating W10 client - WS01
            • PSRemoting
          • Creating Webserver - WEB01
            • Web Services
            • SQL Server
              • Create database
      • Creating secure.local
        • Creating Domain Controller - DC03
        • Creating File/SQL Server - DATA01
          • SQL Server
            • Create database
    • Attack Paths
      • Attack path 1 (hard)
        • Configuring
        • Tasks
        • Manual
      • Attack path 2
        • Configuring
        • Task
        • Manual
    • Troubleshooting
    • To-Do
  • Vulnerabilities & Misconfigurations & Attacks
    • Initial Access Attacks
      • Username Enumeration
        • Password Spraying
        • AS-REP Roasting
        • Empty Password
      • SMB Relaying
      • SMB Null-Session (To-Do)
      • SQL Server default login
    • Active Directory Attacks
      • Password spraying
      • AS-REP Roasting
      • Empty password
      • Password in description
      • Kerberoasting
      • Delegation Attacks
        • Unconstrained Delegation
          • Printerbug
        • Constrained Delegation
        • Resource Based Constrained Delegation
          • Computeraccount Takeover
          • Change-LockScreen
          • Webclient Attack (todo)
      • DACL-Abuses
        • Write Owner
        • Owns
        • WriteDacl
        • GenericAll
        • GenericWrite (todo)
        • ForceChangePassword
        • Add user to group (todo)
        • Targeted Kerberoast (todo)
        • Get-Changes
      • Reused local administrator (todo)
      • SQL Server Attacks (todo)
        • Initial Access
          • SQL Server default login
          • Normal domain user access
        • Privilege Escalation
          • Impersonation
          • DB-Owner
          • Enumerate Logins
            • Weak passwords
        • Executing Commands
        • Database-Links
        • Capturing hashes & Relaying
      • Reading LAPS passwords (todo)
      • Priviliged Groups (todo)
        • DNS-Admins (todo)
        • Account Operators (todo)
        • Backup Operators
        • Server Operators (todo)
      • Hopping domains and forests
        • Child to parent domain
          • Krbtgt hash
          • Trust key
        • Cross forest Attacks (todo)
          • Foreign user
    • Misc
      • Reverse shell trick
      • Lateral Movement
        • PSRemoting
        • PsExec (todo)
      • Misconfigured Service (todo)
        • Unqouted Service Path
      • Discovering Shares
      • Password on shares
      • Different methods of dumping credentials
        • LSASS (todo)
        • Dumping DPAPI
          • Browser passwords
        • Scheduled tasks (todo)
        • Services (todo)
        • Vssadmin Shadow Copy
      • ms-ds-machineaccountquota (todo)
      • add DNS Records (todo)
      • Bypassing UAC
    • Template page
  • Defence
    • Detection
    • Hardening
      • LDAP
        • LDAP Signing
        • LDAPS Binding
      • Strong Password Policy
      • Change who can join computers to the domain
      • Protected users group
      • Account is sensitive and cannot be delegated
      • Powershell Execution Policy
      • Template page
Powered by GitBook
On this page
  • Configuring
  • Firefox Credentials
  • Google Chrome
  • Attacking
  • How it works
  • Tools
  • Executing the attack
  • Defending
  • Recommendations
  • Detection
Edit on GitHub
  1. Vulnerabilities & Misconfigurations & Attacks
  2. Misc
  3. Different methods of dumping credentials
  4. Dumping DPAPI

Browser passwords

PreviousDumping DPAPINextScheduled tasks (todo)

Last updated 2 years ago

Configuring

  1. Download Firefox and the Chrome standalone installers.

2. Transfer them to and install them on DATA01.

3. Login with Administrator and the password Welcome01! to DC03 and create a user with the name bob.

net user bob CredentialDumping01! /add /domain

4. Login with the user Bob and the password CredentialDumping01! on DATA01.

Firefox Credentials

  1. Open FireFox, go to the settings by opening the menu in the right top and clicking "Settings".

  2. Open the "Privacy and Security" tab and scroll down to the "Login and Passwords" section.

3. Click on "Saved Logins" and click in the bottom on "Create New Login". Fill in the following information to save something within the Browser:

Google Chrome

  1. Open Google Chrome, go to the settings by opening the menu in the right top and clicking "Settings".

  2. Click on "Autofill" and then on "Passwords"

3. In the "Save Passwords" section click on "Add". Fill in the following information and click "Save".

Attacking

How it works

The saved passwords are stored in a which lets the user decrypt them without asking for a password as long as they aren't protected with a master password.

Tools

Executing the attack

To execute the attack administrator privileges to the machine and user credentials for the users which we want to extract the credentials from are required.

  1. From the Kali machine install the DonPapi tool.

  2. Create a creds.txt file and place the credentials from bob in here with the <USER>:<PASSWORD> format. Bob:CredentialDumping01!

3. Execute the following command to run DonPapi against DATA01 using the creds.txt file and dumping all the credentials saved for this user on DATA01:

python3 DonPAPI.py Administrator:'Welcome01!'@10.0.0.101 -local_auth -credz creds.txt

We discovered the saved credentials in Chrome and Firefox.

Defending

Recommendations

  • Don't save passwords in browsers and use a passwordmanager such as LastPass, BitWarden or KeePass.

Detection

DonPapi
https://www.mozilla.org/en-US/firefox/all/#product-desktop-release
https://www.google.com/chrome/?standalone=1