module

PuTTY Saved Sessions Enumeration Module

Disclosed
N/A
Created
2018-05-30

Description

This module will identify whether Pageant (PuTTY Agent) is running and obtain saved session
information from the registry. PuTTY is very configurable; some users may have configured
saved sessions which could include a username, private key file to use when authenticating,
host name etc. If a private key is configured, an attempt will be made to download and store
it in loot. It will also record the SSH host keys which have been stored. These will be connections that
the user has previously after accepting the host SSH fingerprint and therefore are of particular
interest if they are within scope of a penetration test.

Author

Stuart Morgan stuart.morgan@mwrinfosecurity.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use post/windows/gather/enum_putty_saved_sessions
msf post(enum_putty_saved_sessions) > show actions
...actions...
msf post(enum_putty_saved_sessions) > set ACTION < action-name >
msf post(enum_putty_saved_sessions) > show options
...show and set options...
msf post(enum_putty_saved_sessions) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.