Before we start I would like to bring your attention to this PSP course from Pentester Academy -
https://www.pentesteracademy.com/course?id=21. The course is focused on Powershell scripting which can be used in pentesting activities.
Description -
A powershell script that extract locally stored passwords from the system.
Script Code -
Proof of Concept -
Msf Ruby script -

Powershell Version of above msf script -
The script can be found on my github -
https://github.com/hexachordanu/PSP/blob/master/Local-PasswordSearch.ps1
This blog post has been created for completing the requirements of the SecurityTube PowerShell for Penetration Testers Certification Exam
https://www.pentesteracademy.com/course?id=21
Student ID: PSP-3250
https://www.pentesteracademy.com/course?id=21. The course is focused on Powershell scripting which can be used in pentesting activities.

(Image Source : Forbse)
A powershell script that extract locally stored passwords from the system.
Script Code -
Proof of Concept -
Msf Ruby script -
Powershell Version of above msf script -
Script Execution results -
References -
https://www.itechtics.com/find-wifi-password/
https://github.com/rapid7/metasploit-framework/blob/master/modules/post/windows/gather/credentials/windows_autologin.rb
https://devblogs.microsoft.com/scripting/use-powershell-to-decrypt-lsa-secrets-from-the-registry/
https://github.com/samratashok/nishang/blob/master/Gather/Get-LSASecret.ps1
https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1
https://github.com/hexachordanu/PSP/blob/master/Local-PasswordSearch.ps1
This blog post has been created for completing the requirements of the SecurityTube PowerShell for Penetration Testers Certification Exam
https://www.pentesteracademy.com/course?id=21
Student ID: PSP-3250
Comments
Post a Comment