module

Windows Pulse Secure Connect Client Saved Password Extractor

Disclosed
01/01/1970
Created
12/04/2020

Description

This module extracts and decrypts saved Pulse Secure Connect Client passwords from the
Windows Registry. This module can only access credentials created by the user that the
Meterpreter session is running as.
Note that this module cannot link the password to a username unless the
Meterpreter sessions is running as SYSTEM. This is because the username associated
with a password is saved in 'C:\ProgramData\Pulse Secure\ConnectionStore\[SID].dat',
which is only readable by SYSTEM.
Note that for enterprise deployment, this username is almost always the domain
username.

Author

Quentin Kaiser

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

    msf > use post/windows/gather/credentials/pulse_secure
    msf /(e) > show actions
        ...actions...
    msf /(e) > set ACTION < action-name >
    msf /(e) > show options
        ...show and set options...
    msf /(e) > run
  
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.