Overview
The triage command is a comprehensive wrapper that executes all user DPAPI extraction commands in a single run. It automatically triages credentials, vaults, RDG files, and certificates for all accessible users on the system.Basic Usage
Command Arguments
Decryption Methods
- Domain Backup Key
- User Credentials
- Masterkey Mappings
- RPC Decryption
Targeting Options
| Argument | Description |
|---|---|
/server:SERVER | Triage remote server (requires admin access and pvk/password) |
When using
/server, you must also supply either /pvk or /password for decryption.What Gets Triaged
The triage command executes the following operations:1
Credential Manager Credentials
Searches
%LOCALAPPDATA%\Microsoft\Credentials\ for all users and decrypts credential files2
Windows Vaults
Searches
%LOCALAPPDATA%\Microsoft\Vault\ folders and decrypts vault data (browser passwords, etc.)3
RDP Passwords
Searches for RDCMan.settings and .rdg files containing saved RDP connection passwords
4
User Certificates
Searches
%APPDATA%\Microsoft\Crypto\RSA\ for user certificate private keysExecution Context
- Elevated
- Unelevated
When run with administrative privileges:
- Triages all users on the system
- Accesses all user profile directories
- Maximum data collection
Example Output
Common Scenarios
Post-Domain Compromise
Post-Domain Compromise
After obtaining domain admin and retrieving the backup key:
Local Admin Compromise
Local Admin Compromise
Using Mimikatz-extracted masterkeys:
Known User Credentials
Known User Credentials
When you have a specific user’s credentials:
Detection Considerations
Detection Indicators:- Bulk access to multiple users’ DPAPI directories
- Reading of Credential Manager files
- Access to Vault folders across user profiles
- Enumeration of certificate stores
- Potential LSASS access (if masterkeys are extracted)
- Monitor bulk access to
%LOCALAPPDATA%\Microsoft\Credentials\ - Alert on access to
%LOCALAPPDATA%\Microsoft\Vault\ - Track certificate private key file access
- Monitor for process accessing multiple user profiles
- Detect non-standard processes reading DPAPI protected data
Related Commands
credentials
Decrypt only Credential Manager credentials
vaults
Decrypt only Windows Vault data
rdg
Decrypt only RDP connection passwords
certificates
Decrypt only certificate private keys
machinetriage
Triage machine/SYSTEM DPAPI data
backupkey
Retrieve domain DPAPI backup key
Tips
Performance Optimization
Performance Optimization
- Use
/mkfileinstead of inline masterkeys for better performance - Target specific users when possible instead of triaging all users
- Use individual commands (credentials, vaults) if you only need specific data types
OPSEC Improvements
OPSEC Improvements
- Run without elevation to only triage current user (less noisy)
- Use
/unprotectfor RDG files when possible (no masterkeys needed) - Target specific remote systems instead of broad sweeps
- Redirect output to file with
/consoleoutfileto minimize artifacts
Troubleshooting
Troubleshooting
No data decrypted:
- Verify decryption method is correct (pvk, password, masterkeys)
- Check if DPAPI data actually exists for target users
- Ensure proper permissions to read user profile directories
- Elevate to Administrator for multi-user triage
- Verify remote admin access for
/serveroperations - Check if target files are locked or in use