VALUEVAULT is a Golang compiled version of the “Windows Vault Password Dumper” browser credential theft tool from Massimiliano Montoro, the developer of Cain & Abel.[1]
# build VALUEVAULT on Windows
go build -mod vendor -trimpath -o b.exe -a main.go
# copy binary to Resources\payloads\SideTwist
copy b.exe ..\Resources\payloads\SideTwist
# run the executable
./b.exe
go build -mod vendor -trimpath -o b.exe -a main.go
To run vault
unit tests:
# from the Resources\VALUEVAULT directory
go test vault -a -v
To run db
unit tests:
# from the Resources\VALUEVAULT directory
go test db -a -v
Open Internet Explorer OWA credentials:
1. Enter https://10.1.0.6/owa/auth/logon.aspx in address bar
2. Bypass certificate errors
3. Enter account credentials
4. A small prompt will appear on the bottom of the page prompting to save the credentials
5. Save credentials
Will create SQLite database with output of Windows Credential Value for Internet Explorer
Execute:
./b.exe
Output:
{homedir}\{username}\AppData\Roaming\fsociety.dat or %AppData%
Database layout:
logins(
origin_url VARCHAR NOT NULL,
username_value VARCHAR,
password VARCHAR
)
Remove {homedir}\{username}\AppData\Roaming\fsociety.dat
Remove b.exe
Requires Python3
cd .\read-db
python3 -m venv env
env/Scripts/activate.bat
pip3 install -r requirements.txt
python3 .\read-db.py