cred
dpapi::cred
decrypts DPAPI saved credential such as RDP, Scheduled tasks, etc (cf. dumping DPAPI secrets). It has the following command line arguments:
/in
: the file path to decrypt. The file locations areC:\Users\<UserName>\AppData\Local\Microsoft\Credentials\<credential_blob>\
andC:\Users\<UserName>\AppData\Roaming\Microsoft\Credentials\<credential_blob>\
. Tools like Seatbelt come in handy for enumerating credential blob files' location/lsaiso
: In Windows, the LSAISO process runs as an Isolated User Mode (IUM) process in a new security environment that is known as Virtual Secure Mode (VSM). It is used when Credentials Guard is in place/masterkey
: the masterkey to use for decryption. It can be obtained throughsekurlsa::dpapi
./password
: the password to decrypt the blob/unprotect
: displays the decryption results on screen
The following example was taken from Benjamin's howto ~ scheduled tasks credentials guide, which displays the content of the credential file:
Last updated