Sticky Notes (Credential Harvesting)
The Windows Sticky Notes application stores user notes locally in a database file. Users frequently save credentials, VPN keys, server IPs and internal information inside notes. This makes it a valuable post-exploitation and privilege escalation enumeration target.File Locations
Windows 10 (1607+) & Windows 11
Windows 10 (1507 / 1511), Windows 8, Windows 7
Why This Matters
Users commonly store:- Domain credentials
- RDP passwords
- VPN credentials
- Database credentials
- API keys
- Internal URLs
- Administrator notes
Quick Loot
Find all Sticky Notes files
From low privilege shell
Extract Data — Windows 10/11 (SQLite)
Copy file
Read locally (attacker machine)
Quick dump
Extract Data — Windows 7 / 8 / Early 10 (SNT)
The.snt file is an OLE structured storage file.