Have you ever allowed someone access to your computer - even for just a minute? Did you know that all they need to do is plug in a USB Flash drive, quickly run a script which takes just a few seconds to run, and they will have all of your browser, mail and other passwords collected on their Flash drive!
Why not try this and see what passwords can be collected from your system - you may be surprised just how easy it is to collect all your passwords? It is also quite handy as it will save all your passwords to a file in case you forget them in the future.
You do not need to make a bootable USB drive for this exercise, simply copy the files to your USB drive (or a folder on your hard disk)
Tip: You may also like to look at the Windows GUI utility Win-UFO. If you use the Report feature, it will automatically generate a complete 'report' when run on a live Windows system which includes collecting the important files (e.g. Registry, event logs, firewall logs, etc.) as well as browser passwords, etc. It does take at least 5 minutes to run though.
1. Go to the NirSoft website Recovery Tools page - click on the click here link as shown below:
2. Download the ZIP file and extract it to a new folder called Passrec on your USB drive or hard disk (you can make the folder at the root or in any folder or sub-folder). You may get a warning that the file is malicious (because it can be used to get your application passwords!).
3. Open Notepad and cut and paste the following text into it and save the file as GetPass.cmd (make sure you use Save As and select All Files *.* when you save it, so that the file extension is .cmd and not .cmd.txt).
The folder structure should be as below:
Just double-click on the GetPass.cmd file and it will take a few seconds to run. You should see a new folder has been made on your Flash drive - e.g. COMPNAME_16112011_2013 (which is the computername and date and time that the files were made). Inside this folder will be a number of .txt files. Double-click on these files to see all your passwords!
If you can get admin access to the system, you can also retrieve the Windows User password too. See here for a Hak5 video and here for the original Room362 article.
1. Download ProcDump.exe from the sysinternals website.
2. Add an extra command to the .cmd script
To decode the .dmp file you need mimikatz.exe. As this may be prevented from running by AV software, you can analyze the .dmp file on another system at a later date.
1. Download Version 2.0 Alpha of mimikatz from here.
2. Extract the Alpha folder to a folder on your hard disk
3. Type mimikatz (you should see the English mimikatz 2.0 alpha (x64) sign on. If you have a Win32/x86 system then use the Win32 version
4. Type sekurlsa::minidump J:\lsass.dmp (change the path to point to your .dmp file) - it should say 'Switch to MINIDUMP'
5. Type sekurlsa::logonpasswords full (it should now display the current password that was used to login)
6. type exit to quit mimikatz