Vulnerability & Exploit Database

Back to search

Windows Enumerate LSA Secrets

This module will attempt to enumerate the LSA Secrets keys within the registry. The registry value used is: HKEY_LOCAL_MACHINE\Security\Policy\Secrets\. Thanks goes to Maurizio Agazzini and Mubix for decrypt code from cachedump.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

post/windows/gather/lsa_secrets

Authors

  • Rob Bathurst <rob.bathurst [at] foundstone.com>

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use post/windows/gather/lsa_secrets msf post(lsa_secrets) > sessions ...sessions... msf post(lsa_secrets) > set SESSION <session-id> msf post(lsa_secrets) > show options ...show and set options... msf post(lsa_secrets) > run