Posts: 101
Threads: 34
Joined: Oct 2014
I am trying to learn about privilege escalation and at one point the tutorials says to try a registry search for passwords.
i.e.
reg query HKCU /f password /t REG_SZ /s
and
reg query HKLM /f password /t REG_SZ /s
I have some passwords that returned that seem to be encrypted, what encryption do they use?
Posts: 2,267
Threads: 16
Joined: Feb 2013
while you are on that learning trip, I think it wouldn't hurt to read this about "encrypted passwords":
https://www.techsolvency.com/passwords/d...ecrypting/
Posts: 101
Threads: 34
Joined: Oct 2014
Thanks for the article and mild rebuke. Actually I have been guilty of using the wrong terminology and my understanding is clearer now.
Although, in my question above I thought I asked a legitimate question.
If passwords are retrieved from the registry are they stored as base64?
Posts: 803
Threads: 135
Joined: Feb 2011
Passwords from the registry can be everything. Which password are you talking about?
It can be Windows passwords (LM, NTLM), it can be application password (FTP, etc.), please be more specific about the one(s) your have found.
Posts: 101
Threads: 34
Joined: Oct 2014
Here is one of the results from the registry pull.
HKEY_CURRENT_USER\Software\pdfforge\PDFCreator\Settings\ApplicationSettings\Accounts\TimeServerAccounts\0
Password REG_SZ xxxxxxmCO6g=
(I x'd out half of the password)
Posts: 2,301
Threads: 11
Joined: Jul 2010
There is no generic answer to that, it depends on the software that put the info there. The password could be hashed, encrypted or simply encoded.
Posts: 803
Threads: 135
Joined: Feb 2011
The '=' at the end *migth* be a padding, often used by base64/32 encoding.
+1 you need to know how the software writes it.
Posts: 101
Threads: 34
Joined: Oct 2014
Thanks for the info. I'll take a deeper look.