Pillaging
Pillaging is the process of obtaining information from a compromised system. It can be personal information, corporate blueprints, credit card data, server information, infrastructure and network details, passwords, or other types of credentials, and anything relevant to the company or security assessment we are working on.
Here is a list of data sources to look for when pillaging:
Installed applications
Installed services
Websites
File Shares
Databases
Directory Services (such as Active Directory, Azure AD, etc.)
Name Servers
Deployment Services
Certificate Authority
Source Code Management Server
Virtualization
Messaging
Monitoring and Logging Systems
Backups
Sensitive Data
Keylogging
Screen Capture
Network Traffic Capture
Previous Audit reports
User Information
History files, interesting documents (.doc/x,.xls/x,password./pass., etc)
Roles and Privileges
Web Browsers
IM Clients
Installed Applications
Via cmd:
Via Powershell & Registry Keys:
Abusing Cookies to access IM Clients
Let's focus on Slack.
There's a tool called SlackExtract released in 2018, which was able to extract Slack messages. It used the cookie named d, which Slack uses to store the user's authentication token.
We can also attempt to steal the cookie from the web browser.
Firefox
Firefox saves the cookies in an SQLite database in a file named cookies.sqlite.
Then we can use the Python script cookieextractor.py to extract cookies from the Firefox cookies.SQLite database.
Finally we can import the cookie in our web browser using Cookie-Editor
Chrome & Chromium based browsers
Chromium-based browsers also stores their cookies information in an SQLite database. The only difference is that the cookie value is encrypted with Data Protection API (DPAPI).
To get the cookie value, we'll need to perform a decryption routine from the session of the user we compromised.
SharpChromium does what we need. It connects to the current user SQLite cookie database, decrypts the cookie value, and presents the result in JSON format.
We use Invoke-SharpChromium, a PowerShell script created by S3cur3Th1sSh1t which uses reflection to load SharpChromium:
If we get an error with the last command refer to => https://academy.hackthebox.com/module/67/section/1637 at "We got an error because the cookie file path"
Clipboard
We can use the Invoke-Clipboard script to extract user clipboard data.
If we wait at some point we will see credentials
Backup Services
If we get access to backup tools such as restic we can use it to backup the entire filesystem or access an existing backup to look for sensitive info such as password hashes in the SAM and SYSTEM hives.
Last updated