Skip to content

josephgrigg/Chrome_Saved_Password_Decryption

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

Chrome_Saved_Password_Decryption

Purpose:

To demonstrate a security flaw with Chrome's password manager.

The Problem:

If you try to view your saved passwords through the Chrome browser, you will receive a pop-up requesting your Windows user account password as shown below.

Unfortunately, this step provides a false sense of security as anyone with access to the computer and logged in under your account can decrypt all of the passwords quickly and easily.

Chrome saves passwords into a SQLite3 database located in Windows here: [username]\Appdata\Local\Google\Chrome\User Data\Default\Login Data

The database itself is not encrypted; however, the stored passwords are encrypted using the Windows DPAPI function CryptProtectData. The problem is that these are encrypted in the context of the Windows user account and no additional entropy is used during encryption. What this means is that you do not actually need to re-enter your user password in order to decrypt the passwords.

A Solution:

Mozilla Firefox's solution to this problem is the 'master password' which it asks for at the start of each session. The master password is a user created password that is used for added entropy during the encryption process. Thus, you would have to know the master password in order to decrypt the saved passwords. Of course, this method is still vulnerable to attacks such as keyloggers, but it does add a useful layer of protection.

Unfortunately, this has been a requested feature for Chrome for years now and it does not appear that they plan to add it. However, there are third party password managers that can be used.

About

Consider this before using Google Chrome's password manager.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages