New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
enum_chrome not decrypting login data #19063
Comments
Can you modify your
To:
To get the content of |
To my uneducated eye I see no difference
|
Nothing got printed, did you reload_all or restart msfconsole? |
Apologies, forgot to, here is the new output:
|
Something with your copy-pasting went wrong, it should have printed this: And not: I seem to have pasted the wrong code, try this: |
Thank you, apologies for the delay, here is the new output:
|
It seems like your Can you change it to this: |
It returned the length as 31:
|
Yes, 31 is not a "good" number - as the expected minimum value should be at least (X-17-15) where X is 32 as this code: Can be empty, but not nil, such is in the case of I am wondering if: https://github.com/agentzex/chrome_v80_password_grabber/blob/master/chrome_v80_password_grabber.py Also fails in the same spot, as the logic seems similar, though written in a bit of a different way Decrypting and then removing the trailing bytes Can you change: To this: And see what it prints out? If it prints out a valid password (with some residual characters at the end) then it would seem there is an option to store passwords in a length that is smaller than 32 bytes |
It seems that changing
|
I don't know what this malformed line (the one that has only 31 bytes in it) means, you can skip it if you wish by doing this:
|
Hi, I am just about clueless when it comes to ruby, but here is where I used the code you have just provided (lines 204-211), this is what the section of the script looks like:
I assume I'm just improperly using your code, here is what was in the log file:
|
No need for the If the
I don't know if it will prevent the syntax error you are seeing, as there is no rspec (unit test) file for this one |
Hi! This issue has been left open with no activity for a while now. We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request. |
Steps to reproduce
How'd you do it?
Expected behavior
Standard decryption and exporting of password data
Current behavior
Calls error
Metasploit version
Framework: 6.4.1-dev
Console : 6.4.1-dev
Console output:
The text was updated successfully, but these errors were encountered: