2023/08/03

Cisco AnyConnect Thief

Intro

This PoC was inspired by RdpThief.

Cisco AnyConnect Secure Mobility Client is used to connect to a VPN and might be configured with RADIUS authentication. If RADIUS authentication is used, users enter their password in this process, which is most probably running in user context. This provides an interesting attack vector if you are interested in the credentials of a user.

The corresponding Windows API calls can be hooked and the password extracted. That was the assumption for the PoC

“Talk is cheap, show me the code”: proof of concept for this password extraction on my git instance.

How this PoC works

Figure out API calls with password In this case it is lstrlenW where the password (“VeryPassword”) appears.

Everything passed to the Windows API call, including the password (in this case “WOWOPASSWORD”) is dumped into a text file:

Sample output

Sources:

https://www.mdsec.co.uk/2019/11/rdpthief-extracting-clear-text-credentials-from-remote-desktop-clients/