# Password managers, Teamviewer, Outlook, etc.

{% embed url="<https://www.netexec.wiki/smb-protocol/obtaining-credentials>" %}

<figure><img src="https://4199783661-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MFF3hT6DtJlHn9jAel9%2Fuploads%2FnlEokS8hWpfi1U4Wh1J5%2Fimage.png?alt=media&#x26;token=9a905cc9-cdb5-44a2-aeda-11adb82dbbf9" alt=""><figcaption></figcaption></figure>

## ThievingFox - Keepass, MobaXTerm, etc

{% embed url="<https://github.com/Slowerzs/ThievingFox/>" %}

## Password Managers

{% embed url="<https://github.com/efchatz/pandora#getting-started>" %}

## Keepass

```
$ NetExec smb <ip> -u user -p pass -M keepass_discover
$ NetExec smb <ip> -u user -p pass -M keepass_trigger -o KEEPASS_CONFIG_PATH="path_from_module_discovery"
```

### Keepass database kdbx

{% content-ref url="../../privilege-escalation/windows/credentials-hunting" %}
[credentials-hunting](https://0xss0rz.gitbook.io/0xss0rz/pentest/privilege-escalation/windows/credentials-hunting)
{% endcontent-ref %}

### CVE-2023-32784 - 2.X Master Password Dumper

Keepass < 2.54

{% embed url="<https://github.com/vdohney/keepass-password-dumper>" %}

{% embed url="<https://github.com/matro7sh/keepass-dump-masterkey>" %}

### Keepwn - Keepass 2.5x - CVE-2023-24055

{% embed url="<https://github.com/Orange-Cyberdefense/KeePwn>" %}

{% embed url="<https://github.com/alt3kx/CVE-2023-24055_PoC>" %}

{% embed url="<https://github.com/deetl/CVE-2023-24055>" %}

### Keethief - KeePass 2.X

{% embed url="<https://github.com/GhostPack/KeeThief>" %}

### KeePass triggers are dead, long live KeePass triggers!

{% embed url="<https://d3lb3.github.io/keepass_triggers_arent_dead/>" %}

Or in French (Nice Talk 🥳):&#x20;

{% embed url="<https://www.youtube.com/watch?app=desktop&v=nFIbQ5ew9PU>" %}

## Veeam

{% embed url="<https://github.com/S3cur3Th1sSh1t/SharpVeeamDecryptor?s=03>" %}

## Teamviewer

{% content-ref url="../../public-exploit/teamviewer" %}
[teamviewer](https://0xss0rz.gitbook.io/0xss0rz/pentest/public-exploit/teamviewer)
{% endcontent-ref %}

## Solar-PuTTY

{% embed url="<https://github.com/VoidSec/SolarPuttyDecrypt>" %}

<figure><img src="https://4199783661-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MFF3hT6DtJlHn9jAel9%2Fuploads%2FItzDoumUZIwyyRJnIkQH%2Fimage.png?alt=media&#x26;token=b8da8d37-69ab-4603-92e3-2f1385062a13" alt=""><figcaption></figcaption></figure>

## Outlook - Pwnlook

{% embed url="<https://github.com/amjcyber/pwnlook>" %}

{% embed url="<https://singhswaraj.medium.com/how-i-discovered-a-3000-microsoft-outlook-security-vulnerability-c45651be17a6>" %}

{% content-ref url="../../internal-pentest/microsoft-office-and-outlook" %}
[microsoft-office-and-outlook](https://0xss0rz.gitbook.io/0xss0rz/pentest/internal-pentest/microsoft-office-and-outlook)
{% endcontent-ref %}

Also check:

{% content-ref url="../../privilege-escalation/windows/credentials-hunting" %}
[credentials-hunting](https://0xss0rz.gitbook.io/0xss0rz/pentest/privilege-escalation/windows/credentials-hunting)
{% endcontent-ref %}

## Bitlocker Recovery Keys

{% embed url="<https://github.com/p0dalirius/ExtractBitlockerKeys>" %}
