Win - Local Passwords/Files
Search
# Windows CMD
CMD> findstr /si password *.txt *.ini *.config
CMD> findstr /SI "passw pwd" *.xml *.ini *.txt *.ps1 *.bat *.config
# File Names and File Contents
CMD> dir /s *pass* == *cred* == *vnc* == *.config*
CMD> dir /S /B *pass*.txt == *pass*.xml == *pass*.ini == *cred* == *vnc* == *.config*
CMD> where /R C:\ user.txt
CMD> where /R C:\ *.ini
CMD> dir #List current dir
CMD> dir /a:h C:\path\to\dir #List hidden files
CMD> dir /s /b #Recursive list without shit
CMD> dir /s /b *pass* #List files that contains "pass" word in the filename
CMD> findstr /si password *.txt
CMD> findstr /si password *.xml
CMD> findstr /si password *.ini
# Find all passwords in all files.
CMD> findstr /spin "password" *.*
CMD> findstr /spin "password" *.*
# Powrshell
PS> Select-String -Path .\*.* -Pattern 'pass','cred','pwd' -SimpleMatch
PS> Get-ChildItem -Recurse | Where-Object { ! $_.PSIsContainer } | Select-String -Pattern 'pass','cred','pwd' -SimpleMatchRecycle Bin Hunting
Hidden Files
Unattend.xml
winPEAS can capture the info.

PowerShell History File
winPEAS will capture the info. We will need to manually extract the contents of the file

IIS Config and Web Files

Alternative Data Streams
Files have a primary data stream, which is what we normally see, for example a TXT file with some text inside. However, when a file is placed within another file, the data stream of the second files contents are considered alternate.
Stored Credentials (Credential Manager)

Registry Keys

Hunting for SAM and SYSTEM Backups
Check (M) or (F) permission to modify or Full access.

Last updated