module

Windows Pulse Secure Connect Client Saved Password Extractor

Disclosed
N/A
Created
2020-12-04

Description

This module extracts and decrypts saved Pulse Secure Connect Client passwords from the
Windows Registry. This module can only access credentials created by the user that the
Meterpreter session is running as.
Note that this module cannot link the password to a username unless the
Meterpreter sessions is running as SYSTEM. This is because the username associated
with a password is saved in 'C:\ProgramData\Pulse Secure\ConnectionStore\[SID].dat',
which is only readable by SYSTEM.
Note that for enterprise deployment, this username is almost always the domain
username.

Author

Quentin Kaiser kaiserquentin@gmail.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use post/windows/gather/credentials/pulse_secure
msf post(pulse_secure) > show actions
...actions...
msf post(pulse_secure) > set ACTION < action-name >
msf post(pulse_secure) > show options
...show and set options...
msf post(pulse_secure) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.