We have already learned about dumping and saving plaintext passwords from memory. However, sometimes, not all passwords are dumped. Not to worry—Metasploit has other post-exploitation modules that we can use to gather saved passwords of different applications and services running on the server we compromised.
Dumping other saved passwords from the machine
How to do it...
Let's perform the following steps:
- First, let's check what applications are running on the machine. We will use the following command:
use post/windows/gather/enum_applications
The output of running the preceding command can be seen in the following screenshot:
- To view the available options, all we need is our session:
set session 1
run...