Vulnerability & Exploit Database

Back to search

Windows Gather AutoLogin User Credential Extractor

This module extracts the plain-text Windows user login password in Registry. It exploits a Windows feature that Windows (2000 to 2008 R2) allows a user or third-party Windows Utility tools to configure User AutoLogin via plain-text password insertion in (Alt)DefaultPassword field in the registry location - HKLM\Software\Microsoft\Windows NT\WinLogon. This is readable by all users.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

post/windows/gather/credentials/windows_autologin

Authors

  • Myo Soe

References

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use post/windows/gather/credentials/windows_autologin msf post(windows_autologin) > sessions ...sessions... msf post(windows_autologin) > set SESSION <session-id> msf post(windows_autologin) > show options ...show and set options... msf post(windows_autologin) > run