Skip to content

kabutor/chrome_v80_password_offline

Repository files navigation

chrome_v80_password_offline

this script was tested and working on the 15/November/2023

What is this? A couple of python scripts to view saved Chrome and new Edge credentials offline.

How to use it? run chrome_v80_password_offline.py and you will see all the chrome/edge credentials saved.

You have to pass as parameters:

  • The location of the Local State, Login Data files , you need to specify the Chrome settings folder with -d (usally at %USER%\AppData\Local\Google\Chrome\User Data)
  • the location of the Masterkey directory (usually under %USER%/AppData/Roaming/Microsoft/Protect/), if the program can infer the SID you don't need to pass it, if not it will ask for it.

Optionally you need to know the user password, or use the nopass option if it's a blank one.

Why two python files? On the old version it was because of licensing issues, now is because I plan to reuse chrome_dpapi.py.

chrome_v80_password_offline is a straight copy with some modifications of another repository (1) and that is under the GPL License (as well as this derivated work), the other chrome_dpapi.py depends on dpapick3 ** but it's all my code, so I just move it into the GPL v3.

(1) https://github.com/agentzex/chrome_v80_password_grabber/blob/master/chrome_v80_password_grabber.py (2) https://github.com/tijldeneut/DPAPIck3

What's Offline? Most, almost all, of the methods to extract the Chrome saved credentials of a windows machine depends that you run them as the user logged in, those scripts just ask windows to decrypt the content with a call to dpapi and that is all. But sometimes that is not possible,and you have to extract the credentials, and the machine is not working, hence the "offline" you need to manually extract the needed files and view them it on another machine.

TBAL DPAPI Flaw You can now decode the Chrome (any DPAPI Vault) without the user password, if TBAL registry key is available, read more about https://vztekoverflow.com/2018/07/31/tbal-dpapi-backdoor/ If you enable it with --tbal you need to specify the Windows registry directory (\Windows\System32\config)

Bonus.Cookies

Added a decryptchromecookies.py python script to decrypt the Chrome cookies, file is on the profile Default/Network/Cookies, copy it to the same directory as the Local State and Login Data files, it uses the same method to retrieve the encryption key for the Login Data (is the same) so the requisites are the same

Requisites A lot of python packages, mostly dpapick3.

About

View saved Chrome and new Edge credentials offline

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages