Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/post/windows/gather/credentials/comodo.md
Views: 11791
Module Description
This post-exploitation module gathers artifacts found on comodo related folders from end users systems.
The list of available artifcts are listed within the module and can be added at anytime. Each artifacts are categorised so that users can specify a category to look for.
Verification Steps
Start MSF console
Get a Meterpreter session on a Windows system
use post/windows/gather/credentials/comodo
Set SESSION 1
enter 'run' to extract credentials from all applications
Options
REGEX
Users can set their own regular expressions so that it could be applied for the credential extraction. The default is set to ^password.
VERBOSE
By default verbose is turned off. When turned on, the module will show information on files which aren't extracted and information that is not directly related to the artifact output.
STORE_LOOT
This option is turned on by default and saves the stolen artifacts/files on the local machine, this is required for also extracting credentials from files using regexp, JSON, XML, and SQLite queries.
EXTRACT_DATA
This option is turned on by default and will perform the data extraction using the predefined regular expression. The 'Store loot' options must be turned on in order for this to take work.