1. 8
  1.  

  2. 5

    TL;DR no vulnerabilities

    1. 6

      but once an attacker has administrative rights on a machine it’s nearly impossible to stop them from grabbing the information they want from the target. With a few PowerShell one-liners and some WMI, we can quickly enumerate KeePass configurations and set monitors to grab necessary key files

      To be fair, with admin access you could also just monitor the clipboard. Or check their browser’s saved passwords. Aside from physical access, admin access is practically cheating.