Overview
The vaults command searches for Windows Vault folders and decrypts their contents using masterkeys, domain backup keys, or user credentials. Vaults contain web credentials, Internet Explorer passwords, and other sensitive authentication data.Windows Vaults are stored in
%LOCALAPPDATA%\Microsoft\Vault\ and contain credentials for web browsers, network resources, and Windows applications.Basic Usage
Command Arguments
Decryption Methods
- Domain Backup Key
- Masterkey Mappings
- User Credentials
- RPC Decryption
Targeting Options
| Argument | Description |
|---|---|
/target:FOLDER | Target specific vault folder |
/server:SERVER | Triage remote server (requires admin access + pvk/password) |
When using
/target:FOLDER, the folder must either contain :SHA1 masterkeys in the command line, or contain DPAPI masterkey files with a /pvk backup key supplied.How Vaults Work
Windows Vaults use a two-stage encryption process:1
Policy File Decryption
The
Policy.vpol file is encrypted with user’s DPAPI masterkey and contains AES encryption keys2
AES Key Extraction
Decrypting Policy.vpol reveals AES128 and AES256 keys used for credential encryption
3
Credential Decryption
The AES keys decrypt
.vcrd credential files containing usernames and passwordsExecution Context
- Elevated
- Unelevated
When run with administrative privileges:
- Triages all users on the system
- Accesses vault folders in all user profiles
- Maximum credential recovery
Example: Using Masterkey Mappings
Example: Using Domain Backup Key
Example: Offline/Forensic Analysis
Types of Vault Data
Web Credentials
Web Credentials
- VaultID:
4bf4c442-9b8a-41a0-b380-dd4a704ddb28 - Internet Explorer saved passwords
- Edge (legacy) saved credentials
- Web form authentication data
Windows Credentials
Windows Credentials
- VaultID:
2f1a6504-0641-44cf-8bb5-3612d865f2e5 - Network authentication credentials
- Windows domain credentials
- Generic Windows passwords
Application Credentials
Application Credentials
- Application-specific saved credentials
- Third-party application passwords
- Windows service credentials
Vault File Structure
Vaults are located at:- Policy.vpol: DPAPI-encrypted AES keys
- *.vcrd: AES-encrypted credential files
- Credentials: Subdirectory with additional credential files
Common Scenarios
Post-Domain Compromise
Post-Domain Compromise
After obtaining domain admin and the backup key:
Using Mimikatz-Extracted Masterkeys
Using Mimikatz-Extracted Masterkeys
Extract masterkeys with Mimikatz and use for vault decryption:
Specific User Credentials
Specific User Credentials
When you have a user’s password or hash:
Offline Vault Analysis
Offline Vault Analysis
Analyzing copied vault folders:
Detection Considerations
Host-Based Indicators:- Reading files from
%LOCALAPPDATA%\Microsoft\Vault\ - Non-standard processes accessing Policy.vpol files
- Bulk enumeration of vault folders across user profiles
- Access to .vcrd credential files
- Monitor access to
%LOCALAPPDATA%\Microsoft\Vault\directories - Alert on Policy.vpol file access
- Track processes reading vault credential files
- Detect vault access from unauthorized processes
- Monitor for bulk vault enumeration
Related Commands
credentials
Decrypt Credential Manager files
masterkeys
Decrypt user masterkeys first
triage
Comprehensive user DPAPI triage
backupkey
Retrieve domain backup key
Tips
Maximizing Vault Recovery
Maximizing Vault Recovery
- Run elevated to access all users’ vaults
- Use domain backup key for comprehensive coverage
- Check multiple vault GUIDs (Web Credentials, Windows Credentials)
- Pay attention to FriendlyName field for credential source
- Correlate Resource URLs with target infrastructure
OPSEC Considerations
OPSEC Considerations
- Run unelevated to only access current user (less noisy)
- Use
/mkfileinstead of inline masterkeys to avoid command line logging - Target specific vault folders if you know what you’re looking for
- Redirect output to file with
/consoleoutfile - Avoid bulk enumeration if stealth is required
Troubleshooting
Troubleshooting
No vaults decrypted:
- Verify masterkeys or backup key is correct
- Check that vault folders actually exist
- Ensure you have read permissions to vault directories
- Confirm Policy.vpol file exists in vault folder
- Vault may be empty (no .vcrd files)
- Check for Credentials subdirectory
- Verify AES keys were extracted from Policy.vpol
- Some vaults may not contain credential entries
- Different vaults may use different masterkeys
- Extract more masterkeys using Mimikatz
- Use domain backup key for complete coverage