From 627e86b57aa34bfc88b1a7fd792039c796c7ceef Mon Sep 17 00:00:00 2001 From: V <45754825+vxsh4d0w@users.noreply.github.com> Date: Sat, 31 Aug 2024 19:15:33 +0000 Subject: [PATCH] Module MobaXTerm Password Extraction --- Modules/Apps/MobaXterm_Passwords_key.mkape | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 Modules/Apps/MobaXterm_Passwords_key.mkape diff --git a/Modules/Apps/MobaXterm_Passwords_key.mkape b/Modules/Apps/MobaXterm_Passwords_key.mkape new file mode 100644 index 000000000..43e39b0b3 --- /dev/null +++ b/Modules/Apps/MobaXterm_Passwords_key.mkape @@ -0,0 +1,15 @@ +Description: Module to extract a copy of MobaXterm encrypted passwords +Category: Live Response +Author: Vito Alfano +Version: 1.0 +Id: a7473175-e108-4b93-81cb-49c6e7d37ff9 +ExportFormat: txt +Processors: + - + Executable: C:\Windows\System32\cmd.exe + CommandLine: /c reg export "HKEY_CURRENT_USER\Software\Mobatek\MobaXterm\P" %destinationDirectory%\Mobaterm_Pass_key.txt + ExportFormat: txt + +# Documentation +# https://xmcyber.com/blog/extracting-encrypted-credentials-from-common-tools-2/ +# https://github.com/XMCyber/XMCredentialsDecryptor