Internals & Weaknesses of the DPAPI for the Protection of Our Data on Windows presented at BlueHatIL 2020

by Benjamin Delpy,

Summary : DPAPI has been already discussed, but how does it work? Internally?How can you use or abuse it to get credentials, more and more credentials?In this presentation I will describe and demo, step by step, many ways to decrypt credentials protected by DPAPI with mimikatz, for your pleasure!