module
Windows Pulse Secure Connect Client Saved Password Extractor
Disclosed | Created |
---|---|
01/01/1970 | 12/04/2020 |
Disclosed
01/01/1970
Created
12/04/2020
Description
This module extracts and decrypts saved Pulse Secure Connect Client passwords from the
Windows Registry. This module can only access credentials created by the user that the
Meterpreter session is running as.
Note that this module cannot link the password to a username unless the
Meterpreter sessions is running as SYSTEM. This is because the username associated
with a password is saved in 'C:\ProgramData\Pulse Secure\ConnectionStore\[SID].dat',
which is only readable by SYSTEM.
Note that for enterprise deployment, this username is almost always the domain
username.
Windows Registry. This module can only access credentials created by the user that the
Meterpreter session is running as.
Note that this module cannot link the password to a username unless the
Meterpreter sessions is running as SYSTEM. This is because the username associated
with a password is saved in 'C:\ProgramData\Pulse Secure\ConnectionStore\[SID].dat',
which is only readable by SYSTEM.
Note that for enterprise deployment, this username is almost always the domain
username.
Author
Quentin Kaiser
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use post/windows/gather/credentials/pulse_secure msf /(e) > show actions ...actions... msf /(e) > set ACTION < action-name > msf /(e) > show options ...show and set options... msf /(e) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.