Adding Credentials#
Interactive CLI#
| |
Web UI#
Credentials page > “Add Credential” > fill the form > Create.
Listing Credentials#
CLI:
| |
Web UI: Credentials page shows a searchable table with type, username, domain, and source.
Searching#
Filter by type, username, domain, source host, or source module:
| |
Web UI: Use the filter fields above the credentials table.
Exporting#
| |
API:
| |
Auto-Extraction#
When server-side modules return credential data (e.g., hash dump results), credentials are automatically extracted and stored with full provenance:
- Source agent — which agent the credential came from
- Source module — which module extracted it
- Timestamp — when it was extracted
Module authors implement this in parse_result() by returning ExtractedCredential objects. See Building Tools Modules for details on credential extraction.
Credential Types#
| Type | Description |
|---|---|
plaintext | Plaintext password |
hash | Password hash (NTLM, LM, etc.) |
ticket | Kerberos ticket |
ssh_key | SSH private key |
token | Session token or bearer token |
api_key | API key |
certificate | X.509 certificate |
Integration with Tools#
Credentials stored in the store can be consumed by tools modules via --cred-id. The manager decrypts the credential and passes it to the module automatically. See Tools.
At-Rest Encryption#
All credential secrets are encrypted in the engagement database using the engagement’s master key (derived from the passphrase via PBKDF2). See Security Model.