Files
nuclei-templates/code/windows/audit/plaintext-passwords-in-memory.yaml

33 lines
1.4 KiB
YAML
Raw Normal View History

2024-10-24 11:30:13 +07:00
id: plaintext-passwords-in-memory
info:
2024-10-24 11:30:13 +07:00
name: Plaintext Passwords Stored in Memory
author: princechaddha
severity: high
2024-10-24 11:30:13 +07:00
description: Checks if passwords are stored in memory in plaintext, potentially exposing sensitive information to unauthorized memory access.
impact: |
2024-10-24 11:30:13 +07:00
Storing passwords in plaintext in memory can expose sensitive credentials to attackers who gain access to memory dumps or can read memory directly, leading to unauthorized access and data breaches.
remediation: |
2024-10-24 11:30:13 +07:00
Ensure that all sensitive data, especially passwords, are stored in memory in an encrypted or hashed format to mitigate the risk of exposure.
tags: windows,security,credentials,windows-audit
self-contained: true
code:
- pre-condition: |
IsWindows();
engine:
- powershell
- powershell.exe
args:
- -ExecutionPolicy
- Bypass
pattern: "*.ps1"
source: |
2024-10-24 11:30:13 +07:00
if ((Get-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -ErrorAction SilentlyContinue).UseLogonCredential -eq 1) { "Plaintext passwords are stored in memory." }
matchers:
- type: word
words:
2024-11-27 08:16:07 +00:00
- "Plaintext passwords are stored in memory."
2024-12-02 11:38:21 +00:00
# digest: 4b0a0048304602210096f5a69a7eb5f990f7b6990997bbe801df7482b8883d6e9153360b9ed49d8df80221008946a1d10b3516bfdfd8925376bbbf0a091ac7236f0d6e223bbf5b3de884ed8a:922c64590222798bb761d5b6d8e72950