Overview
TheWindowsVault command enumerates credentials saved in the Windows Vault, which is a secure credential storage system used by Windows applications. The Windows Vault commonly stores web credentials from Internet Explorer and Microsoft Edge, network passwords, and other application credentials.
Important: User commands run for the current user if not elevated and for ALL users if elevated.
Syntax
Output
The command returns:- Vault credential entries
- Resource names and URLs
- Usernames associated with credentials
- Credential types (Web Credentials, Windows Credentials, etc.)
- Last modified timestamps
- Password visibility status (encrypted)
Use Cases
Red Team
- Credential Harvesting: Extract saved credentials from Windows Vault
- Web Credential Access: Obtain browser-saved passwords from IE/Edge
- Network Authentication: Find saved network passwords
- Lateral Movement: Use harvested credentials for network access
- Privilege Escalation: Discover credentials with elevated privileges
Blue Team
- Credential Hygiene Audit: Identify users storing credentials in Windows Vault
- Security Assessment: Review saved credentials for compliance
- Incident Response: Quickly identify potentially compromised credentials
- User Education: Identify users needing credential management training
- Risk Assessment: Evaluate exposure from stored credentials
Example Output
Privilege Context
- Non-Elevated: Enumerates Windows Vault credentials for the current user only
- Elevated: Enumerates Windows Vault credentials for the current user (Vault is user-specific, but elevation may provide access to additional vault types)
Remote Execution
This command does not support remote execution (not marked with + in the command list).Detection Considerations
Indicators
- Calls to Windows Vault API (CredEnumerate, VaultEnumerateVaults, etc.)
- Access to Windows Vault credential stores
- Reading credential metadata
- DPAPI operations for credential decryption
Defensive Monitoring
- Monitor Windows Vault API calls from unexpected processes
- Alert on credential enumeration by non-standard applications
- Track access to Vault credential stores
- Log processes querying Vault contents
- Detect credential dumping tools accessing Windows Vault
- Monitor for bulk credential enumeration
Vault Credential Types
- Web Credentials: IE/Edge saved website passwords
- Windows Credentials: Network passwords and domain credentials
- Certificate-Based Credentials: Smart card and certificate credentials
- Generic Credentials: Application-specific credentials
DPAPI Protection
- Windows Vault credentials are encrypted with DPAPI
- Decryption requires user’s DPAPI master key
- Can be decrypted with user context or master key access
- Provides protection against offline attacks
Security Recommendations
- Educate users on secure credential management
- Discourage storing sensitive credentials in browsers
- Implement policies restricting credential storage
- Use enterprise credential management solutions
- Enable logging for credential access
- Regularly audit Windows Vault contents
- Consider disabling password saving in browsers via Group Policy
Related Commands
- CredEnum: Enumerates saved credentials using CredEnumerate() API
- WindowsCredentialFiles: Finds Windows credential DPAPI blobs
- DpapiMasterKeys: Lists DPAPI master keys needed for decryption
- ChromiumPresence: Checks for Chromium browser credential stores
- FirefoxPresence: Checks for Firefox browser credential stores
- IEFavorites: Lists Internet Explorer favorites