Have you ever allowed someone access to your computer - even for just a minute? Did you know that all they need to do is plug in a USB Flash drive, quickly run a script which takes just a few seconds to run, and they will have all of your browser, mail and other passwords collected on their Flash drive!
Why not try this and see what passwords can be collected from your system - you may be surprised just how easy it is to collect all your passwords? It is also quite handy as it will save all your passwords to a file in case you forget them in the future.
You do not need to make a bootable USB drive for this exercise, simply copy the files to your USB drive (or a folder on your hard disk)
Tip: You may also like to look at the Windows GUI utility Win-UFO. If you use the Report feature, it will automatically generate a complete 'report' when run on a live Windows system which includes collecting the important files (e.g. Registry, event logs, firewall logs, etc.) as well as browser passwords, etc. It does take at least 5 minutes to run though.
1. Go to the NirSoft website Recovery Tools page - click on the click here link as shown below:
2. Download the ZIP file and extract it to a new folder called Passrec on your USB drive or hard disk (you can make the folder at the root or in any folder or sub-folder). You may get a warning that the file is malicious (because it can be used to get your application passwords!).
3. Open Notepad and cut and paste the following text into it and save the file as GetPass.cmd (make sure you use Save As and select All Files *.* when you save it, so that the file extension is .cmd and not .cmd.txt).
for /F "tokens=1-2 delims=: " %%l in ('time /t') do set hhmm=%%l%%m
FOR /F %%G IN ('DIR /b %r%\*.txt') do call :DELZ %r%\%%G
@echo PASSWORD FILES COLLECTED ARE:
dir %r%\*.txt | find /I ".txt"
REM if size of file is less than 3 bytes then delete it
if %~z1 LEQ 2 del %~f1
The folder structure should be as below:
\PassRec\(all files from NirSoft download)
How to use these utilities
Just double-click on the GetPass.cmdfile and it will take a few seconds to run. You should see a new folder has been made on your Flash drive - e.g. COMPNAME_16112011_2013 (which is the computername and date and time that the files were made). Inside this folder will be a number of .txt files. Double-click on these files to see all your passwords!
Collect the Windows Password
If you can get admin access to the system, you can also retrieve the Windows User password too. See here for a Hak5 video and here for the original Room362 article.