We create a way to automate doing the window sticky keys hack from a bootable USB. Then, we automate getting as many saved passwords as possible, drop a listener, and delete all traces that we were there.. All without being detected by antivirus, we should add a mimikittenz option if the computer was found running and unlocked, otherwise we can just run it later remotely
How To Use Sticky Keys Hack
Requirements: a linux bootable USB, this repo on the USB (not in the OS, just put it in the root directory)
Also Read DVIA – Damn Vulnerable iOS Application
- shutdown windows (make sure not hibernating by holding shift while pressing shut down)
- hit F12 and select USB
sudo -i
fdisk -l
(note: if you’re on Kali Linux, runparted -l
)mkdir /media/windows
mount /dev/WHATEVERTHEWINDOWSPARTITIONWASCALLED /media/windows -t ntfs
- run Stickykeys.sh
- restart and boot to Windows
- hit Shift 5 times fast, a command prompt will appear
- cd to the USB and run WinPirate.bat
If the computer isn’t locked: Then cd to the USB and run Run.bat (this will run WinPirate.bat silently in the background, it should be done in < 10 seconds
Current Issues
- The chrome passwords grabber that I made is still a .py For it to work, I need to convert it to exe so it doesn’t require python to be installed on the system.
You can run it withpython chromepasswords.py -csv
and it will decrypt the Chrome saved passwords database and export it as a CSV - The sticky keys automation doesn’t speed the process up as much as I previously thought, as evident by the lengthy “How to Use” section
- I haven’t been able to write any tools that grab passwords for IE or Firefox