New issue
Advanced search Search tips

Issue 704944 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner: ----
Closed: Mar 2017
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: Bug-Security



Sign in to add a comment

I could extract all the encrypted passwords and email address using cmd

Reported by magdysak...@gmail.com, Mar 24 2017

Issue description

Hi, i'm here to report that anyone using any RAT software with cmd access can get all stored passwords and email addresses on victims machines very easily.

firstly I know well that passwords are encrypted in : C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Login Data
and the only ( normal ) way to show stored passwords and email addresses is using the browser > chrome://settings/passwords .. and if you using password for managing your windows account it will ask for it, but there is another way I found.

first download tease software ( ChromePass , nircmdc )
that you can find at http://www.nirsoft.net/password_recovery_tools.html

I tried to use chromepass.exe in cmd with /stext pass.txt but for some reasons it doesn't work so I used these commands to capture a screenshot and close chromepass automatically 

1 - ChromePass.exe 
2 - nircmd.exe cmdwait savescreenshot shot.png
3 - TASKKILL /IM ChromePass.exe

and all the password now in shot.png

after doing this I simply used metsaploit and backdoor-factory 
after backdoor note++ I sent it to my windows 7 vmware machine and got reverse shell session 
after using :
1 - session -u 1 
2 - exploit/windows/local/bypassuac with session 2 
i successfully got meterpreter session and bypass windows UAC  

then uploaded chromepass.exe and nircmd.exe to the victim's machine 
dropped to shell and redo commands above 
then back to meterpreter and download the screenshot .

I hope that my efforts will be appreciated.  

more contacts:
- +201061031594
- facebook.com/rebellionil

 
Screenshot at 2017-03-24 08-33-32.png
143 KB View Download
Screenshot at 2017-03-24 08-31-03.png
107 KB View Download
17495734_423643604637900_933291892_n.png
303 KB View Download
17409584_423661044636156_615133184_n.png
288 KB View Download
Status: WontFix (was: Unconfirmed)
http://dev.chromium.org/Home/chromium-security/security-faq#TOC-Why-aren-t-physically-local-attacks-in-Chrome-s-threat-model-

Thanks for reporting! Physically local attack is outside the scope of Chrome's threat model. 
the idea isn't in the local attack but in the ability to show all the encrypted passwords without any permissions , and in my mind it's an important security vulnerability , i'm i right ? 
Project Member

Comment 3 by sheriffbot@chromium.org, Jul 1 2017

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment