module

Windows Gather Unattended Answer File Enumeration

Disclosed
N/A
Created
2018-05-30

Description

This module will check the file system for a copy of unattend.xml and/or
autounattend.xml found in Windows Vista, or newer Windows systems. And then
extract sensitive information such as usernames and decoded passwords. Also
checks for '.vmimport' files that could have been created by the AWS EC2 VMIE service.

Authors

Sean Verity veritysr1980@gmail.com
sinn3r sinn3r@metasploit.com
Ben Campbell eat_meatballs@hotmail.co.uk
GhostlyBox

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use post/windows/gather/enum_unattend
msf post(enum_unattend) > show actions
...actions...
msf post(enum_unattend) > set ACTION < action-name >
msf post(enum_unattend) > show options
...show and set options...
msf post(enum_unattend) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.