chrome
dpapi::chrome
dumps stored credentials and cookies from Chrome. (cf. dumping DPAPI secrets) It has the following command line arguments:
in
: theC:\Users\<UserName>\AppData\Local\Google\Chrome\User Data\Default\Login Data
for the saves logins and theC:\Users<UserName>\AppData\Local\Google\Chrome\User Data\Default\Cookies
for the cookieskey
: it is the key output value of thedpapi::masterkey in:"C:\Users\<UserName>\AppData\Roaming\Microsoft\Protect\SID\MasterKey_ID" /rpc
. it is useful for offline dumping of Chrome. CoreSecurity has published an excellent guide on how this can be accomplished offlinestate
: TODOencryptedkey
: TODO/password
: the user's password to use for decryption/masterkey
: the masterkey to use for decryption. It can be obtained throughsekurlsa::dpapi
./unprotect
: display the decryption results on screen
Last updated