Crates.io | keepass-dump-extractor |
lib.rs | keepass-dump-extractor |
version | 0.1.0 |
source | src |
created_at | 2024-02-01 12:26:41.91916 |
updated_at | 2024-02-01 12:26:41.91916 |
description | Find and collect parts of a Keepass master key to recover it in plain text from a memory dump |
homepage | https://github.com/JorianWoltjer/keepass-dump-extractor |
repository | https://github.com/JorianWoltjer/keepass-dump-extractor |
max_upload_size | |
id | 1123073 |
size | 21,564 |
Find and collect parts of a Keepass master key to recover it in plain text from a memory dump
While typing out the master key to unlock a KeePass database, the value of the input box is stored in memory. While it is visually hidden using '●' characters, the last character was briefly visible in memory, and keeps being stored there (CVE-2023-3278, fixed in KeePass 2.54 released June 3rd 2023). That makes it possible to find strings like the following in the memory dump:
s
●e
●●c
●●●r
●●●●e
●●●●●t
This tool finds such strings and combines them into one password. Due to noise or retyping in the memory dump it will also print some false positives (especially for earlier characters), but with brute-forcing or a bit of common sense these should be easy to filter out.
It differes from existing tools (like keepass-password-dumper
or keepass-dump-masterkey
) in the various useful output formats, and its ability to extract non-ascii character in UTF16 encoding. If the master key uses unicode characters like 'ø', this tool will be able to find those too (iykyk).
cargo install keepass-dump-extractor
Or download and extract a pre-compiled binary from the Releases page.
This attack requires a memory dump of the KeePass process, and can generate all possible master keys to unlock the keepass database file (.kdbx
). With the following commands, you can generate a wordlist, extract the hash from the database, and crack it with the wordlist:
keepass-dump-extractor KeePassDumpFull.dmp -f all > wordlist.txt
keepass2john passwords.kdbx > passwords.kdbx.hash
hashcat -m 13400 --username passwords.kdbx.hash wordlist.txt
Within a few seconds you should be able to find the password with this method, if most of the typed master key was inside of the memory dump. For more complex cases where there is limited information however, some different output formats might allow you to manually find what fits.
The -f
(--format
) option allows you to choose an output format that fits your use case the best. Here are its possible values:
Warning: The following output examples were articicially made clearer by adding a first charcter, but in reality, the first character cannot be recovered because it not easily recognizable by a prefixed '●' in the memory dump.
found
: Directly print all hints about the passwordDeduplicate and order unknowns by number of occurences, so the first character will likely be the correct one.
For example:
s
●e
●3
●●c
●●●r
●●●●e
●●●●3
●●●●●t
gaps
: Summarize the hints into the full size, leaving gaps for unknown charactersGroup positions together to permute one position at a time. Ordered by number of occurences, so the first character will likely be the correct one. Useful for manually comparing what letter fits best in between known letters.
For example:
secr●t
s3cr●t
s●cret
s●cr3t
all
: Print all possible permutations of the passwordUsing the unknown characters, it generates the "cartesian product" meaning all possible passwords are output. This is useful for generating a wordlist for cracking tools like hashcat.
For example:
secret
s3cret
secr3t
secr3t
raw
: Write the raw results with all found informationPrint the raw results as this tool parsed them, useful for scripts. It is also the only way to view how many times a character occured at that position in the memory dump, normally this is only seen in the order.
For example:
10 0 s
10 1 e
2 1 3
10 2 c
10 3 r
1 4 3
10 4 e
10 5 t