Back to search

Windows Gather Group Policy Preference Saved Passwords

This module enumerates the victim machine's domain controller and connects to it via SMB. It then looks for Group Policy Preference XML files containing local user accounts and passwords and decrypts them using Microsofts public AES key. Cached Group Policy files may be found on end-user devices if the group policy object is deleted rather than unlinked. Tested on WinXP SP3 Client and Win2k8 R2 DC.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

post/windows/gather/credentials/gpp

Authors

  • Ben Campbell <eat_meatballs [at] hotmail.co.uk>
  • Loic Jaquemet <loic.jaquemet+msf [at] gmail.com>
  • scriptmonkey <scriptmonkey [at] owobble.co.uk>
  • theLightCosine <theLightCosine [at] metasploit.com>
  • mubix <mubix [at] hak5.org>

References

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use post/windows/gather/credentials/gpp msf post(gpp) > sessions ...sessions... msf post(gpp) > set SESSION <session-id> msf post(gpp) > show options ...show and set options... msf post(gpp) > run