24.Pillaging
Installed Applications
mRemoteNG
Abusing Cookies (Slack - Firefox)
Abusing Cookies (Slack - Chrome)
Clipboard
Attacking Backup Servers (restic)
Core Concept:
Pillaging: Extracting valuable data (credentials, configurations, sensitive files) from a compromised system to further lateral movement or achieve penetration testing objectives.
Key Areas & Techniques:
Installed Applications:
Use
dir
to quickly list programs.Use PowerShell
Get-ItemProperty
to get detailed application info from the registry.
mRemoteNG:
Locate
confCons.xml
(connection configuration).Use
mremoteng_decrypt.py
to decrypt stored credentials (default or custom master password).Use a for loop to bruteforce passwords.
IM Client Access (Slack):
Firefox: Copy
cookies.sqlite
and usecookieextractor.py
to extract authentication cookies.Chrome: Copy the Cookies file, and use
Invoke-SharpChromium
to decrypt the cookies.Use Cookie editor browser extensions to import the captured cookies.
Clipboard:
Use
Invoke-ClipboardLogger
(PowerShell) to capture clipboard data (passwords, 2FA tokens).
Backup Servers (restic):
Use
restic
to create and restore backups.Initialize repositories, backup directories (with VSS for system files), and restore backups using snapshot IDs.
Target backup files for sensitive data.
General Principles:
Target diverse data sources (fileshares, databases, browsers, etc.).
Focus on credential harvesting.
Adapt to the specific environment and applications.
Understand the roles and services running on the compromised host.
Tools & Commands:
dir
(Windows command)PowerShell
Get-ItemProperty
,copy
,IEX
python3 mremoteng_decrypt.py
python3 cookieextractor.py
Invoke-SharpChromium
(PowerShell)Invoke-ClipboardLogger
(PowerShell)restic.exe
Key Focus:
Credential access (passwords, cookies).
Lateral movement through extracted information.
Understanding backup systems.
Last updated