mirror of
https://github.com/carlospolop/hacktricks
synced 2025-02-16 22:18:27 +00:00
GitBook: [master] one page modified
This commit is contained in:
parent
9f5faf7455
commit
26a766ebcd
1 changed files with 2 additions and 1 deletions
|
@ -886,7 +886,8 @@ You can **extract many DPAPI masterkeys** from memory with the Mimikatz `sekurls
|
|||
|
||||
### AppCmd.exe
|
||||
|
||||
**AppCmd.exe** is located in the `%systemroot%\system32\inetsrv\` directory.
|
||||
**Note that to recover passwords from AppCmd.exe you need to be Administrator and run under a High Integrity level.
|
||||
AppCmd.exe** is located in the `%systemroot%\system32\inetsrv\` directory.
|
||||
If this file exists then it is possible that some **credentials** have been configured and can be **recovered**.
|
||||
|
||||
This code was extracted from _**PowerUP**_:
|
||||
|
|
Loading…
Add table
Reference in a new issue