Credentials from Password Stores

Credentials from Password Stores (T1555)

1. Web Browsers (Chrome / Edge)

Browsers encrypt saved passwords using the Windows DPAPI (Data Protection API).

  • Key: Encrypted with the user's logon password. Since you are running as the user, you can decrypt it.
  • Files:
    • Chrome: %LOCALAPPDATA%\Google\Chrome\User Data\Default\Login Data (SQLite DB).
  • Tools: HackBrowserData, Mimikatz dpapi::chrome.

2. Password Managers (KeePass)

  • KeePass: Encrypted database (.kdbx).
  • Attack:
    • Keylogging the Master Password.
    • Dumping the Master Key from memory if KeePass is open (KeeThief).

3. Windows Credential Manager

Similar to browser passwords but for RDP/SMB.

  • Command: vaultcmd /list
  • Tool: Mimikatz -> vault::cred.