| 
 | 
   | Google Talk (GTalk) stores all remembered    gmail account information at following registry location. | 
 | 
 | 
   | HKEY_CURRENT_USER\Software\Google\Google     Talk\Accounts | 
 | 
 | 
   | For each Google account
 separate  registry    key is created with the account email id as name 
under this key.  Account    password is encrypted and stored in the 
registry string value named 'pw'    within this account registry key. 
 For  more information on what    mechanism GTalk uses to encrypt the 
password and how to decrypt it  refer    to following research article, 
   'Exposing  Google Password Secrets'
 
 | 
| 
 | 
| 
 | 
| 
 | 
| 
 | 
   |  | 
     
 | 
 | 
   | Windows Live Messenger stores the account    password at 'Credential Store'
 which  provides different mechanisms such    as 'Generic', 'Domain 
Network', 'Domain Visible Network' etc which    applications can use to 
store and retrieve their private credentials.    Each such method 
requires different technique and privilege level to    enumerate and 
decrypt the passwords. 
 
 Windows Live  Messenger    uses 'Generic Password' mechanism of  'Credential Store' to store the    passwords under the target name 'WindowsLive:name=<email_id>'.    To know    more about how to recover stored    passwords by Live Messenger, read on to this research article,   'Exposing  the    Password Secrets of MSN/Windows Live Messenger'
 .
 | 
   |  | 
   | 
 | 
| 
 | 
| 
 | 
|  | 
     
 | 
 | 
   | MSN Messenger also uses 'Credential Store'  to securely store the remembered passwords. These passwords are  stored    as type 'Domain Visible Network' aka '.Net Passport' using the target    name as '.Net passport' within the 'Credential Store'. 
 For more     details on how MSN Messengers stores the passwords and how 
to decrypt    such passwords using the code example, read on to 
following research    article 'Exposing     the Password Secrets of MSN/Windows Live Messenger'
 
 You  can recover all MSN    messenger stored passwords using    MSNLivePasswordDecryptor     or IMPasswordDecryptor.
 | 
   |  | 
   |  Related Tools:       MSNLivePasswordDecryptor,    IMPasswordDecryptor,   NetworkPasswordDecryptor | 
   |  | 
   |  | 
   |  | 
     
 | 
 | 
   | Yahoo Messenger prior to version 7  used to    store the password in the registry value  'EOptions String'   at following    registry location, | 
 | 
 | 
   | HKEY_CURRENT_USER\Software\Yahoo\Pager | 
 | 
 | 
   | This password is encrypted and then encoded using       Yahoo64
    (similar to Base64) algorithm and stored at above location. The 
actual     algorithm and encoding functionality is present in  ycrwin32.dll 
 For version 7   onwards, Yahoo stores the encrypted token derived from username  &    password in    registry value    'ETS' at same registry location. Though you cannot    decrypt this token back to the password but you can copy it to  another machine and continue to login to Yahoo    Messenger.
 
 For more interesting details on this password token  &    authentication mechanism refer to     this research paper.   (can be found in installed location of Yahoo Messenger).
 | 
   |  | 
   |  Related Tools:      YahooPasswordDecryptor | 
   |  | 
   |  | 
   |  | 
     
 | 
 | 
   | Skype does not store password  directly. Instead    it stores the encrypted hash of the password in the 'config.xml'   located    in Skype's user profile directory. Typical user profile directory for    Skype will be as follows, | 
 | 
 | 
   | [Windows XP] C:\Documents  and    Settings\<user_name>\Application Data\Skype\<account_name>
 
 [Windows    Vista & Windows 7]
 C:\Users\<username>\AppData\Roaming\Skype\<account_name>
 | 
 | 
 | 
   | This config.xml contains <Credentials2>     tag which contains encrypted hash of the password. As per the research     paper 'Vanilla Skype'     written by Fabrice Desclaux and Kostya Kortchinsky, Skype uses the MD5     hash of string "username\nskyper\npassword"  for authentication. If user    has set the 'Remember password' option then this MD5 hash is encrypted     using AES-256 & SHA-1 algorithms  and finally saved into the 'Config.xml'    file. 
 Since the HASH of the password is saved, it is not    possible to 
directly get the password. Instead one has to use  dictionary    or 
brute force approach to find out the right password from the hash.    
This approach may take days or months together based on the length  
&    complexity of the password.
 
 You can use 'SkypePassword' from    Lastbit to recover stored    Skype password.
 | 
   |  | 
   |  Related Tools:   SkypePassword  by Lastbit | 
   |  | 
   |  | 
   |  | 
     
 | 
 | 
   | AIM version 6 onwards stores the  password    at the following registry location, | 
 | 
 | 
   | HKEY_CURRENT_USER\Software\America     Online\AIM6\Passwords | 
 | 
 | 
   | AIM PRO version uses the different    registry location to store the passwords, | 
 | 
 | 
   | HKEY_CURRENT_USER\Software\AIM\AIMPRO\<Account_Name> | 
 | 
 | 
   | It uses the Blowfish algorithm to    encrypt the password and then encodes it using BASE64  method. The    resulting password is saved at above registry location. 
 Version     7+ onwards AIM uses new (yet to be broken ;) ) encryption 
mechanism  with    the encrypted username/password being saved in the 
file     'aimx.bin'    at following location
 | 
   |  | 
   | [Windows XP] C:\Documents  and Settings\<user_name>\Local Settings\Application    Data\AIM
 
 [Windows    Vista & Windows 7]
 C:\Users\<user_name>\AppData\Local\AIM
 | 
   |  | 
   | Internal
 encryption details are not yet clear but appears to be on     the lines
 of Firefox. Reversing is going on but take a while. I will    update 
the details as I discover more ! 
 You    can use Mspass  tool from Nirsoft to recover    passwords stored by AIM 6.x
 | 
   |  | 
   |  Related Tools:   Mspass  by Nirsoft | 
   |  | 
   |  | 
   |  | 
     
 | 
 | 
   | [Version 4.21 build 24] - [Version 5.0.0.26] | 
   | Trillian Astra stores only main  account passwords (called as    Identity or Astra password) in the  'accounts.ini'
 file at below    mentioned location. But all other IM account passwords
 (such as Yahoo,     Gtalk, AIM, MSN etc) are stored on the servers. | 
 | 
 | 
   | [Windows XP] C:\Documents  and    Settings\<user_name>\Application Data\Trillian\users\global\
 
 [Windows     Vista & Windows 7]
 C:\Users\<username>\AppData\Roaming\Trillian\users\global\
 | 
 | 
 | 
   | For each account it contains section named    '[Account<number>]"
 under which  all information for that account is    stored. Username is
 stored in the field named 'Account=' and password  is    stored in the 
field 'Password='. Trillian first performs XOR encoding of    the password with standard pattern and then encodes it with BASE64    before storing it. 
 For more technical details on how different    versions of Trillian 
encrypts the password and how we can manually    decrypt it, refer to 
our following research article
 Exposing  the Password    Secrets of Trillian
 
 You can use    TrillianPasswordDecryptor     to automatically recover passwords stored by all versions of Trillian.
 | 
   |  | 
   |  Related Tools:   TrillianPasswordDecryptor,   IMPasswordDecryptor | 
   |  | 
   |  | 
   |  | 
     
 | 
 | 
   | Pidgin stores all configured account    passwords in the "Accounts.xml" file  located at following directory | 
 | 
 | 
   | [Windows XP] C:\Documents  and    Settings\<user_name>\Application Data\.purple
 
 [Windows  Vista &    Windows 7]
 C:\Users\<username>\AppData\Roaming\.purple
 | 
 | 
 | 
   | Older versions (Gaim) used .gaim folder
     instead of .purple to store the account details. For each stored   
 account, 'Accounts.xml' file contains the <account> tag, which  
has sub    tags <name> & <password> containing the 
account email  address and    password in plain text respectively. 
 You can recover Pidgin    passwords using IMPasswordDecryptor.
 | 
   |  | 
   |  Related Tools:   IMPasswordDecryptor | 
   |  | 
   |  | 
   |  | 
     
 | 
 | 
   | Newer versions of Digsby (Build 83 -  r27225 as    of this writing) stores main account password in the 'logininfo.yaml'    file at following location, | 
 | 
 | 
   | [Windows XP] C:\Documents  and    Settings\<user_name>\Local Settings\Application Data\Digsby
 
 [Windows     Vista & Windows 7]
 C:\Users\<user_name>\AppData\Local\Digsby
 | 
 | 
 | 
   | Digsby
 stores only main account password    locally and all other IM account 
passwords (such as Yahoo, Gmail, AIM)     are stored in the servers. 
Main Digsby password is encrypted using    special algorithm with 
username, windows product id, install date as  key and    resulting 
password is then encoded with BASE64  before storing into the    above password file. 
 Earlier versions of Digsby used to save  the    password in the 'Digsby.dat' file at  following location,
 | 
 | 
 | 
   | [Windows XP] C:\Documents  and    Settings\<user_name>\Application Data\Digsby
 
 [Windows  Vista & Windows    7]
 C:\Users\<user_name>\AppData\Roaming\Digsby
 | 
 | 
 | 
   | Earlier Digsby versions used hardcoded string 'foo' as key without BASE64 encoding. 
 For more    information how Digsby encrypts the password, how it is 
stored in its    secret file and how one can decrypt it manually, refer 
to our research     article  'Exposing the    Password Secrets of Digsby'
 
 You can use    DigsbyPasswordDecryptor  or   IMPasswordDecryptor  to instantly    recover Digsby password for all versions.
 | 
   |  | 
   |  Related Tools:   DigsbyPasswordDecryptor,  IMPasswordDecryptor | 
   |  | 
   |  | 
   |  | 
     
 | 
 | 
   | PaltalkScene stores main account password    at following registry location | 
 | 
 | 
   | HKEY_CURRENT_USER\Software\Paltalk\<nick_name> | 
 | 
 | 
   | Password is encrypted and stored in the    registry value 'pwd'
 under this key.  All other IM passwords such as    Gmail, Yahoo, AIM 
etc are saved under separate sub keys under this    registry key. For 
example Gmail accounts are stored under following    registry key, | 
 | 
 | 
   | HKEY_CURRENT_USER\Software\Paltalk\<nick_name>\GGL\<gmail_address> | 
 | 
 | 
   | All these IM passwords are encoded with BASE64  and stored in 'pwd'    registry value.
 For more technical details on how Paltalk  encrypts the    password and
 how can one decrypt this password, refer    to our research article, Exposing  the Password Secrets of PaltalkScene 
 You can  recover main    password as well as all the IM passwords stored by Paltalk using    PaltalkPasswordDecryptor  &    IMPasswordDecryptor
 | 
   |  | 
   |  Related Tools:  PaltalkPasswordDecryptor,  IMPasswordDecryptor | 
   |  | 
   |  | 
   |  | 
     
 | 
 | 
   | Beyluxe Messenger stores main account password    at following registry location | 
 | 
 | 
   | HKEY_CURRENT_USER\Software\Beyluxe  Messenger\<nick_name> | 
 | 
 | 
   | Password for each user is encrypted and stored in the    registry value 'password'
 under this  key. For more    technical details how Beyluxe encrypts the
 password and how you can    decrypt it manually, refer to the following
 research article,   "Exposing  the Password    Secrets of Beyluxe Messenger" 
 You can recover all    such stored account    passwords by Beyluxe Messenger using    IMPasswordDecryptor
 | 
   |  | 
   |  Related Tools:  IMPasswordDecryptor | 
   |  | 
   |  | 
   |  | 
     
 | 
 | 
   | MySpaceIM is one of the upcoming  instant messenger which stores the    user account & password details at following location. | 
 | 
 | 
   | [Windows XP] C:\Documents  and    Settings\<user_name>\Application Data\MySpace\IM\users.txt
 
 [Windows     Vista & Windows 7]
 C:\Users\<user_name>\AppData\Roaming\MySpace\IM\users.txt
 | 
 | 
 | 
   | The
 user login email id is stored in clear text where as the    password is
 in encrypted format. The password is encrypted using      'Windows Crypto API' functions and then encoded using BASE64BASE64 and then    decrypt it using      CryptUnprotectData function.    algorithm beforing storing into this file. So in order to decrypt it    successfully one has to decode the password using | 
 | 
 | 
   | You can use    IMPasswordDecryptor  to instantly recover stored account passwords by    MySpaceIM. | 
   |  | 
   |  Related Tools:   IMPasswordDecryptor | 
   |  | 
   |  | 
   |  | 
     
 | 
 | 
   | 
Miranda is open source based  popular messenger of recent times. Like most instant messengers,     Miranda
 also stores the all user  account information including     passwords 
in the profile location. This is to prevent the user from     entering 
the passwords each time. 
 Latest version of Miranda     (v0.9.10) stores the user account  & password in the profile file at     following location
 | 
 | 
 | 
   | [Windows XP] C:\Documents and Settings\<user_name>\Application    Data\Miranda\%profile_name%\%profile_name%.dat
 
 [Windows Vista  &    Windows 7]
 C:\Users\<username>\AppData\Roaming\Miranda\%profile_name%\%profile_name%.dat
 | 
 | 
 | 
 | User
 can have multiple profiles  specific     to office or home environment 
and corresponding account information     is stored in the respective 
profile file. 
 Initial versions of     Miranda stored all account information in .dat 
file directly within     the base location as shown below,
 | 
 | 
 | 
   | [Windows XP] C:\Documents  and    Settings\<user_name>\Application  Data\Miranda\<profile_name>.dat
 
 [Windows    Vista & Windows 7]
 C:\Users\<user_name>\AppData\Roaming\Miranda\<profile_name>.dat
 | 
 | 
 | 
   | Miranda uses its own proprietary mechanism to encrypt the password     before storing into the profile file. 
 For more details on    how Miranda encrypts the password for different 
protocols and how to    decode those secrets refer to following research
 article,    "Exposing the Password    Secrets of Miranda"
 
 | 
   | You can use    MirandaPasswordDecryptor  to instantly recover    all stored account passwords by    Miranda. | 
   |  | 
   |  Related Tools:   MirandaPasswordDecryptor,   IMPasswordDecryptor | 
   |  | 
    
No comments:
Post a Comment