Skip to content

Latest commit

 

History

History
39 lines (26 loc) · 1.35 KB

notepad.md

File metadata and controls

39 lines (26 loc) · 1.35 KB

Notepad

This module searched for stored data in Notepad and Notepad++ in the following locations:

  • Notepad++ backup files:

    C:\Users\<UserProfile>\APPDATA\Roaming\NotePad++\backup\

  • Microsoft Notepad backup files (Windows 11 / Server 2025 only)

    C:\Users\<UserProfile>\AppData\Local\Packages\Microsoft.WindowsNotepad_*\LocalState\TabState\

{% hint style="info" %} Default behaviour in Windows 11 and Windows Server 2025 is to store Notepad files on disk in binary files. This module will attempt to extract readable strings from these files. {% endhint %}

For each system output is stored in $pwd\PME\PME\Notepad\

Supported Methods

  • MSSQL
  • SMB
  • SessionHunter (WMI)
  • WMI
  • WinRM

Optional Parameters

ParameterValueDescription
-ShowOutputN/ADisplays each target output to the console
-SuccessOnlyN/ADisplay only successful results

Usage

{% code overflow="wrap" %}

# Standard execution
PsMapExec -Username [User] -Password [Pass] -targets [All] -Module Notepad -Method [Method] -ShowOutput

{% endcode %}