#recipe=Encode_text('UTF-16LE%20(1200)')MD4()
#recipe=From_Hex('Auto')MD4()
#recipe=To_Upper_case('All')From_Base32('A-Z2-7%3D',true)Generate_TOTP('',32,6,0,30)
#recipe=To_Lower_case()Substitute('abdefiklmnopstuvwxyz','αβδεφικλμηορςτυνωχγζ')
#recipe=From_Base64('A-Za-z0-9%2B/%3D',true,false)RSA_Decrypt('-----BEGIN RSA PRIVATE KEY-----','','RSAES-PKCS1-V1_5','SHA-1')
How to retrieve the encrypted administrator password?
In AWS CloudShell:
ii="i-..." # The ID of the Windows instance
aws ec2 get-password-data --instance-id ${ii} | jq .PasswordData
#recipe=Encode_text('UTF-16LE (1200)')To_Base64('A-Za-z0-9%2B/%3D')
#recipe=From_Base64('A-Za-z0-9%2B/%3D',true,false)Decode_text('UTF-16LE (1200)')
#recipe=Fork('\\n','\\n',false)Find_/_Replace({'option':'Simple string','string':'$HEX['},'',true,false,true,false)Find_/_Replace({'option':'Simple string','string':']'},'',true,false,true,false)From_Hex('None')
#recipe=From_Decimal('Space',false)
Note
An example of certificate (i.e., "x5c") can be found on https://login.windows.net/common/discovery/keys
#recipe=From_Base64('A-Za-z0-9%2B/%3D',true,false)To_Hex('Space',0)Hex_to_PEM('CERTIFICATE')Parse_X.509_certificate('PEM')
#recipe=Parse_X.509_certificate('PEM')Regular_expression('User%20defined','Modulus((?::%5C%5Cs*%5B0-9a-f%5D%7B2%7D)*)',true,true,false,false,false,false,'List%20capture%20groups')Find_/_Replace(%7B'option':'Regex','string':'%5B:%5C%5Cs%5D'%7D,'',true,false,true,false)From_Base(16)
#recipe=From_Base64('A-Za-z0-9%2B/%3D',true,false)To_Hex('Space',0)Hex_to_PEM('CERTIFICATE')Parse_X.509_certificate('PEM')Regular_expression('User defined','Modulus((?::\\s*[0-9a-f]{2})*)',true,true,false,false,false,false,'List capture groups')Find_/_Replace({'option':'Regex','string':'[:\\s]'},'',true,false,true,false)From_Base(16)
Note
An example of certificate (i.e., "n") can be found on https://login.windows.net/common/discovery/keys
#recipe=From_Base64('A-Za-z0-9-_',true,false)To_Hex('None',0)From_Base(16)