Fixing typos
This commit is contained in:
parent
e4f3c9be09
commit
01ad18dcf1
|
@ -6,7 +6,7 @@ Dumping revelant information on compromised targets without AV detection
|
|||
## DPAPI dumping
|
||||
Lots of credentials are protected by [DPAPI](https://docs.microsoft.com/en-us/dotnet/standard/security/how-to-use-data-protection).
|
||||
|
||||
We aim at locating those "secured" credentials, and retreive them using :
|
||||
We aim at locating those "secured" credentials, and retrieve them using :
|
||||
- User password
|
||||
- Domaine DPAPI BackupKey
|
||||
- Local machine DPAPI Key (protecting `TaskScheduled` blob)
|
||||
|
@ -84,10 +84,10 @@ DonPAPI.py -credz credz_file.txt domain/user:passw0rd@target
|
|||
When a domain admin user is available, it is possible to dump the domain backup key using impacket `dpapi.py` tool.
|
||||
|
||||
```bash
|
||||
dpapi.py backupkey --export
|
||||
dpapi.py backupkeys --export -t domain/user:passw0rd@target_dc_ip
|
||||
```
|
||||
|
||||
This backup key can then be used to dump all domain user's secrets!
|
||||
This backup key (pvk file) can then be used to dump all domain user's secrets!
|
||||
|
||||
`python DonPAPI.py -pvk domain_backupkey.pvk domain/user:passw0rd@domain_network_list`
|
||||
|
||||
|
|
Loading…
Reference in New Issue