Skip to content

Commit

Permalink
Readme
Browse files Browse the repository at this point in the history
  • Loading branch information
AlessandroZ committed Apr 27, 2015
1 parent 5c69f54 commit d13d047
Show file tree
Hide file tree
Showing 2 changed files with 16 additions and 6 deletions.
11 changes: 6 additions & 5 deletions CHANGELOG
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
LaZagne 0.2 (27/04/2014)
* New modules: Windows hashes + LSA Secrets
* Passwords found previously are used to test windows hashes and firefox masterpassword
* 500 most famous passwords are used to retrieve the windows password (once we get the hashes)
* Wifi bug fixed: only one password was printed
* I.E bug fixed
- For Windows
* New modules: Windows hashes + LSA Secrets
* Passwords found previously are used to test windows hashes and firefox masterpassword
* 500 most famous passwords are used to retrieve the windows password (once we get the hashes)
* Wifi bug fixed: only one password was printed
* I.E bug fixed


11 changes: 10 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -71,6 +71,8 @@ Supported software
* windows credentials
* Domain visible network (.NET Passport)
* Generic network credentials
* Windows hashes (LM/NT)
* LSA Secrets

* __Linux__
* browsers
Expand Down Expand Up @@ -105,6 +107,10 @@ IE Browser history
Internet Explorer passwords (from IE7 and before Windows 8) can only be decrypted using the URL of the website. This one is used as an argument of the Win32CryptUnprotectData api. So to decrypt it, it is only necessary to retrieve the browsing history of ie.
To do that, I used C code. So I used a dll (the code is in the "browser_history_dll" directory) and it is directly embedded to the Python code as a Base64 string (c.f. ie.py). Once launched, the dll is written to the disk, a wrapper is used to call dll functions and then the dll file is removed from the disk.

Windows hashes
----
To dump windows hashes and LSA Secrets, the impacket library has been used: https://github.com/CoreSecurity/impacket

Build your own password recovery script
----
It's possible to write your own script for the software of your choice.
Expand All @@ -131,9 +137,12 @@ To compile the source code, some external libraries are required.

* Python for Windows Extensions
* http://sourceforge.net/projects/pywin32/

* Impacket (for Windows hashes + LSA Secrets)
* https://github.com/CoreSecurity/impacket

* For Linux
* None for Ubuntu 14.04
* None for Ubuntu 14.04 (except Python 2.7)
* Other distributions
* crypto
* dbus
Expand Down

0 comments on commit d13d047

Please sign in to comment.