This module iterates through each users %APPDATA% folder on the target host and identifies files associated with FileZilla that often store credentials such as:
%AppData%\FileZilla\sitemanager.xml
%AppData%\FileZilla\recentservers.xml
Any discovered credentials will be decoded to the plaintext value if not encrypted by a master password.
For each system output is stored in $pwd\PME\PME\FileZilla\
- MSSQL
- SMB
- SessionHunter (WMI)
- WMI
- WinRM
Parameter | Value | Description |
---|---|---|
-ShowOutput | N/A | Displays each target output to the console |
-SuccessOnly | N/A | Display only successful results |
{% code overflow="wrap" %}
# Standard execution
PsMapExec -Username [User] -Password [Pass] -targets [All] -Module FileZilla -Method [Method] -ShowOutput
{% endcode %}