This module iterates through the registry and identifies WinSCP session information, attempts to decrypt it and shows the plaintext session information.
For each system output is stored in $pwd\PME\PME\WinSCP\
- MSSQL
- SMB
- SessionHunter (WMI)
- WMI
- WinRM
Parameter | Value | Description |
---|---|---|
-ShowOutput | N/A | Displays each target output to the console |
-SuccessOnly | N/A | Display only successful results |
{% code overflow="wrap" %}
# Standard execution
PsMapExec -Username [User] -Password [Pass] -targets [All] -Module WinSCP -Method [Method] -ShowOutput
{% endcode %}