module

Delinea Thycotic Secret Server Dump

Disclosed
Aug 15, 2022
Created
Sep 30, 2022

Description

This module exports and decrypts Secret Server credentials to a CSV file;
it is intended as a post-exploitation module for Windows hosts with Delinea/Thycotic
Secret Server installed. Master Encryption Key (MEK) and associated IV values are
decrypted from encryption.config using a static key baked into the software. The
module also supports parameter recovery for encryption configs configured with
Windows DPAPI.

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use post/windows/gather/credentials/thycotic_secretserver_dump
msf post(thycotic_secretserver_dump) > show actions
...actions...
msf post(thycotic_secretserver_dump) > set ACTION < action-name >
msf post(thycotic_secretserver_dump) > show options
...show and set options...
msf post(thycotic_secretserver_dump) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.