module
Windows Gather Remote Desktop Connection Manager Saved Password Extraction
Disclosed | Created |
---|---|
N/A | 2018-05-30 |
Disclosed
N/A
Created
2018-05-30
Description
This module extracts and decrypts saved Microsoft Remote Desktop
Connection Manager (RDCMan) passwords the .RDG files of users.
The module will attempt to find the files configured for all users
on the target system. Passwords for managed hosts are encrypted by
default. In order for decryption of these passwords to be successful,
this module must be executed under the same account as the user which
originally encrypted the password. Passwords stored in plain text will
be captured and documented.
Connection Manager (RDCMan) passwords the .RDG files of users.
The module will attempt to find the files configured for all users
on the target system. Passwords for managed hosts are encrypted by
default. In order for decryption of these passwords to be successful,
this module must be executed under the same account as the user which
originally encrypted the password. Passwords stored in plain text will
be captured and documented.
Author
Tom Sellers tom@fadedcode.net
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.