forked from zobaa0/chromepass
-
Notifications
You must be signed in to change notification settings - Fork 0
/
chromepass.py
126 lines (115 loc) · 4.03 KB
/
chromepass.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
import os
import json
import base64
import sqlite3
import win32crypt
from Crypto.Cipher import AES
import shutil
import time
from datetime import timezone, datetime, timedelta
def main():
count = 0
# get the AES key
key = get_encryption_key()
# local sqlite Chrome database path
db_path = os.path.join(os.environ["USERPROFILE"], "AppData",
"Local", "Google", "Chrome", "User Data",
"default", "Login Data")
# copy the file to another location
# as the database will be locked if chrome is currently running
filename = "ChromeData.db"
shutil.copyfile(db_path, filename)
# connect to the database
db = sqlite3.connect(filename)
cursor = db.cursor()
# 'logins' table has the data we need
cursor.execute("""select origin_url, action_url, username_value,
password_value, date_created, date_last_used
from logins
order by date_created""")
# print the texts at the beginning of the file named "login_data.txt"
sourceFile = open("login_data.txt", 'a')
print("This is a text file containing all the login credentials that you "
"stored in your Google Account via Chrome", file=sourceFile)
print("-|-"* 36, file=sourceFile)
print(file=sourceFile)
# iterate over all rows
for row in cursor.fetchall():
origin_url = row[0]
action_url = row[1]
username = row[2]
password = decrypt_password(row[3], key)
date_created = row[4]
date_last_used = row[5]
count += 1
# stores the results in a txt file named "login_data.txt"
sourceFile = open("login_data.txt", 'a')
if username or password:
print(f"Origin URL: {origin_url}", file=sourceFile)
# print(f"Action URL: {action_url}", file=sourceFile)
print(f"Username: {username}", file=sourceFile)
print(f"Password: {password}", file=sourceFile)
else:
continue
if date_created != 86400000000 and date_created:
print(f"Creation date: {str(get_chrome_datetime(date_created))}", file=sourceFile)
if date_last_used != 86400000000 and date_last_used:
print(f"Last Used: {str(get_chrome_datetime(date_last_used))}", file=sourceFile)
# print a total of 70 '=' at the end of each iteration
print("="*70, file=sourceFile)
# print the total number of accounts recovered after all iterations
sourceFile = open("login_data.txt", 'a')
print(f"\nA total of {count} account details were retrived.", file=sourceFile)
print(f"\nLove from Buchii :)", file=sourceFile)
print("Successfully excuted!")
time.sleep(3)
print("`login_data.txt` has been added to your file directory")
cursor.close()
db.close()
try:
# try to remove the copied db file
os.remove(filename)
except:
pass
def get_chrome_datetime(chromedate):
"""Return a 'datetime.datime' object from a chrome format datetime
Since 'chromedate' is formatted as the number of microseconds since
January, 1601
"""
return datetime(1601, 1, 1) + timedelta(microseconds=chromedate)
def get_encryption_key():
local_state_path = os.path.join(os.environ["USERPROFILE"],
"AppData", "Local", "Google", "Chrome",
"User Data", "Local State")
with open(local_state_path, "r", encoding="utf-8") as f:
local_state = f.read()
local_state = json.loads(local_state)
# decode the encrpytion key from Base64
key = base64.b64decode(local_state["os_crypt"]["encrypted_key"])
# remove DPAPI str
key = key[5:]
# return decrpyted key that was originally encrypted
# using a session key derived from current user's login credentials
# doc: https://timgolden.me.uk/pywin32-docs/win32crypt.html
return win32crypt.CryptUnprotectData(key, None, None, None, 0)[1]
def decrypt_password(password, key):
try:
# get the initialization vector
iv = password[3:15]
password = password[15:]
# generate cipher
cipher = AES.new(key, AES.MODE_GCM, iv)
# decrpyt password
return cipher.decrypt(password)[:-16].decode()
except:
try:
return str(win32crypt.CryptUnprotectData(password, None, None, None, 0)[1])
except:
# not supported
return ""
# If this file was executed like this:
# > chromepass.py
# then call the main function. However, if this file
# was simply imported, then skip the call to main.
if __name__ == '__main__':
main()