|
Google Talk (GTalk) stores all remembered gmail account information at following registry location. |
|
HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts |
|
For each Google account
separate registry key is created with the account email id as name
under this key. Account password is encrypted and stored in the
registry string value named 'pw' within this account registry key.
For more information on what mechanism GTalk uses to encrypt the
password and how to decrypt it refer to following research article,
'Exposing Google Password Secrets'
|
|
|
|
|
|
|
Windows Live Messenger stores the account password at 'Credential Store'
which provides different mechanisms such as 'Generic', 'Domain
Network', 'Domain Visible Network' etc which applications can use to
store and retrieve their private credentials. Each such method
requires different technique and privilege level to enumerate and
decrypt the passwords.
Windows Live Messenger uses 'Generic Password' mechanism of 'Credential Store' to store the passwords under the target name 'WindowsLive:name=<email_id>'. To know more about how to recover stored passwords by Live Messenger, read on to this research article, 'Exposing the Password Secrets of MSN/Windows Live Messenger'
. |
|
|
|
|
|
|
MSN Messenger also uses 'Credential Store' to securely store the remembered passwords. These passwords are stored as type 'Domain Visible Network' aka '.Net Passport' using the target name as '.Net passport' within the 'Credential Store'.
For more details on how MSN Messengers stores the passwords and how
to decrypt such passwords using the code example, read on to
following research article 'Exposing the Password Secrets of MSN/Windows Live Messenger'
You can recover all MSN messenger stored passwords using MSNLivePasswordDecryptor or IMPasswordDecryptor. |
|
Related Tools: MSNLivePasswordDecryptor, IMPasswordDecryptor, NetworkPasswordDecryptor |
|
|
|
|
Yahoo Messenger prior to version 7 used to store the password in the registry value 'EOptions String' at following registry location, |
|
HKEY_CURRENT_USER\Software\Yahoo\Pager |
|
This password is encrypted and then encoded using Yahoo64
(similar to Base64) algorithm and stored at above location. The
actual algorithm and encoding functionality is present in ycrwin32.dll
For version 7 onwards, Yahoo stores the encrypted token derived from username & password in registry value 'ETS' at same registry location. Though you cannot decrypt this token back to the password but you can copy it to another machine and continue to login to Yahoo Messenger.
For more interesting details on this password token & authentication mechanism refer to this research paper. (can be found in installed location of Yahoo Messenger). |
|
Related Tools: YahooPasswordDecryptor |
|
|
|
|
Skype does not store password directly. Instead it stores the encrypted hash of the password in the 'config.xml' located in Skype's user profile directory. Typical user profile directory for Skype will be as follows, |
|
[Windows XP]
C:\Documents and Settings\<user_name>\Application Data\Skype\<account_name>
[Windows Vista & Windows 7]
C:\Users\<username>\AppData\Roaming\Skype\<account_name> |
|
This config.xml contains <Credentials2> tag which contains encrypted hash of the password. As per the research paper 'Vanilla Skype' written by Fabrice Desclaux and Kostya Kortchinsky, Skype uses the MD5 hash of string "username\nskyper\npassword" for authentication. If user has set the 'Remember password' option then this MD5 hash is encrypted using AES-256 & SHA-1 algorithms and finally saved into the 'Config.xml' file.
Since the HASH of the password is saved, it is not possible to
directly get the password. Instead one has to use dictionary or
brute force approach to find out the right password from the hash.
This approach may take days or months together based on the length
& complexity of the password.
You can use 'SkypePassword' from Lastbit to recover stored Skype password. |
|
Related Tools: SkypePassword by Lastbit |
|
|
|
|
AIM version 6 onwards stores the password at the following registry location, |
|
HKEY_CURRENT_USER\Software\America Online\AIM6\Passwords |
|
AIM PRO version uses the different registry location to store the passwords, |
|
HKEY_CURRENT_USER\Software\AIM\AIMPRO\<Account_Name> |
|
It uses the Blowfish algorithm to encrypt the password and then encodes it using BASE64 method. The resulting password is saved at above registry location.
Version 7+ onwards AIM uses new (yet to be broken ;) ) encryption
mechanism with the encrypted username/password being saved in the
file 'aimx.bin' at following location |
|
[Windows XP]
C:\Documents and Settings\<user_name>\Local Settings\Application Data\AIM
[Windows Vista & Windows 7]
C:\Users\<user_name>\AppData\Local\AIM |
|
Internal
encryption details are not yet clear but appears to be on the lines
of Firefox. Reversing is going on but take a while. I will update
the details as I discover more !
You can use Mspass tool from Nirsoft to recover passwords stored by AIM 6.x |
|
Related Tools: Mspass by Nirsoft |
|
|
|
|
[Version 4.21 build 24] - [Version 5.0.0.26] |
Trillian Astra stores only main account passwords (called as Identity or Astra password) in the 'accounts.ini'
file at below mentioned location. But all other IM account passwords
(such as Yahoo, Gtalk, AIM, MSN etc) are stored on the servers. |
|
[Windows XP]
C:\Documents and Settings\<user_name>\Application Data\Trillian\users\global\
[Windows Vista & Windows 7]
C:\Users\<username>\AppData\Roaming\Trillian\users\global\ |
|
For each account it contains section named '[Account<number>]"
under which all information for that account is stored. Username is
stored in the field named 'Account=' and password is stored in the
field 'Password='. Trillian first performs XOR encoding of the password with standard pattern and then encodes it with BASE64 before storing it.
For more technical details on how different versions of Trillian
encrypts the password and how we can manually decrypt it, refer to
our following research article
Exposing the Password Secrets of Trillian
You can use TrillianPasswordDecryptor to automatically recover passwords stored by all versions of Trillian. |
|
Related Tools: TrillianPasswordDecryptor, IMPasswordDecryptor |
|
|
|
|
Pidgin stores all configured account passwords in the "Accounts.xml" file located at following directory |
|
[Windows XP]
C:\Documents and Settings\<user_name>\Application Data\.purple
[Windows Vista & Windows 7]
C:\Users\<username>\AppData\Roaming\.purple |
|
Older versions (Gaim) used .gaim folder
instead of .purple to store the account details. For each stored
account, 'Accounts.xml' file contains the <account> tag, which
has sub tags <name> & <password> containing the
account email address and password in plain text respectively.
You can recover Pidgin passwords using IMPasswordDecryptor. |
|
Related Tools: IMPasswordDecryptor |
|
|
|
|
Newer versions of Digsby (Build 83 - r27225 as of this writing) stores main account password in the 'logininfo.yaml' file at following location, |
|
[Windows XP]
C:\Documents and Settings\<user_name>\Local Settings\Application Data\Digsby
[Windows Vista & Windows 7]
C:\Users\<user_name>\AppData\Local\Digsby |
|
Digsby
stores only main account password locally and all other IM account
passwords (such as Yahoo, Gmail, AIM) are stored in the servers.
Main Digsby password is encrypted using special algorithm with
username, windows product id, install date as key and resulting
password is then encoded with BASE64 before storing into the above password file.
Earlier versions of Digsby used to save the password in the 'Digsby.dat' file at following location, |
|
[Windows XP]
C:\Documents and Settings\<user_name>\Application Data\Digsby
[Windows Vista & Windows 7]
C:\Users\<user_name>\AppData\Roaming\Digsby |
|
Earlier Digsby versions used hardcoded string 'foo' as key without BASE64 encoding.
For more information how Digsby encrypts the password, how it is
stored in its secret file and how one can decrypt it manually, refer
to our research article 'Exposing the Password Secrets of Digsby'
You can use DigsbyPasswordDecryptor or IMPasswordDecryptor to instantly recover Digsby password for all versions. |
|
Related Tools: DigsbyPasswordDecryptor, IMPasswordDecryptor |
|
|
|
|
PaltalkScene stores main account password at following registry location |
|
HKEY_CURRENT_USER\Software\Paltalk\<nick_name> |
|
Password is encrypted and stored in the registry value 'pwd'
under this key. All other IM passwords such as Gmail, Yahoo, AIM
etc are saved under separate sub keys under this registry key. For
example Gmail accounts are stored under following registry key, |
|
HKEY_CURRENT_USER\Software\Paltalk\<nick_name>\GGL\<gmail_address> |
|
All these IM passwords are encoded with BASE64 and stored in 'pwd' registry value.
For more technical details on how Paltalk encrypts the password and
how can one decrypt this password, refer to our research article, Exposing the Password Secrets of PaltalkScene
You can recover main password as well as all the IM passwords stored by Paltalk using PaltalkPasswordDecryptor & IMPasswordDecryptor |
|
Related Tools: PaltalkPasswordDecryptor, IMPasswordDecryptor |
|
|
|
|
Beyluxe Messenger stores main account password at following registry location |
|
HKEY_CURRENT_USER\Software\Beyluxe Messenger\<nick_name> |
|
Password for each user is encrypted and stored in the registry value 'password'
under this key. For more technical details how Beyluxe encrypts the
password and how you can decrypt it manually, refer to the following
research article, "Exposing the Password Secrets of Beyluxe Messenger"
You can recover all such stored account passwords by Beyluxe Messenger using IMPasswordDecryptor |
|
Related Tools: IMPasswordDecryptor |
|
|
|
|
MySpaceIM is one of the upcoming instant messenger which stores the user account & password details at following location. |
|
[Windows XP]
C:\Documents and Settings\<user_name>\Application Data\MySpace\IM\users.txt
[Windows Vista & Windows 7]
C:\Users\<user_name>\AppData\Roaming\MySpace\IM\users.txt |
|
The
user login email id is stored in clear text where as the password is
in encrypted format. The password is encrypted using 'Windows Crypto API' functions and then encoded using BASE64BASE64 and then decrypt it using CryptUnprotectData function. algorithm beforing storing into this file. So in order to decrypt it successfully one has to decode the password using |
|
You can use IMPasswordDecryptor to instantly recover stored account passwords by MySpaceIM. |
|
Related Tools: IMPasswordDecryptor |
|
|
|
|
Miranda is open source based popular messenger of recent times. Like most instant messengers, Miranda
also stores the all user account information including passwords
in the profile location. This is to prevent the user from entering
the passwords each time.
Latest version of Miranda (v0.9.10) stores the user account & password in the profile file at following location
|
|
[Windows XP]
C:\Documents and Settings\<user_name>\Application Data\Miranda\%profile_name%\%profile_name%.dat
[Windows Vista & Windows 7]
C:\Users\<username>\AppData\Roaming\Miranda\%profile_name%\%profile_name%.dat |
|
User
can have multiple profiles specific to office or home environment
and corresponding account information is stored in the respective
profile file.
Initial versions of Miranda stored all account information in .dat
file directly within the base location as shown below, |
|
[Windows XP]
C:\Documents and Settings\<user_name>\Application Data\Miranda\<profile_name>.dat
[Windows Vista & Windows 7]
C:\Users\<user_name>\AppData\Roaming\Miranda\<profile_name>.dat |
|
Miranda uses its own proprietary mechanism to encrypt the password before storing into the profile file.
For more details on how Miranda encrypts the password for different
protocols and how to decode those secrets refer to following research
article, "Exposing the Password Secrets of Miranda"
|
You can use MirandaPasswordDecryptor to instantly recover all stored account passwords by Miranda. |
|
Related Tools: MirandaPasswordDecryptor, IMPasswordDecryptor |
|
No comments:
Post a Comment