Dean Was Here
  • About Me
  • 📣TALKS
    • Zero Knowledge VM Hijinks
      • Page
      • ZK Execution Environments
      • ZK Execution Environments 2
      • ZK VM Hijinks
    • Rolodex
    • Web3 Hacking
      • They Put Money on the Internet!
      • Close Encounters of the Third Web
      • Blockchains and Privacy
      • That Toorcamp Web3 thing
    • DIY Black Badge
    • NSA Playset
      • NSA Playset : Intro
      • NSA Playset : GSM
    • CheapBugs
    • Platypus
    • Hashbounty
    • Breaking Same-Origin
    • Lateral Movement in Linux Environments
    • WiMAX Hacking
    • Seeds of Contempt
    • LibOMG
    • Pickupline
  • 🛠️PROJECTS
    • Bastet.ai
    • ZK Bounty
    • NWeb
      • Masspull
      • Scan Token
    • ponzi.finance
    • Birdfeeder
    • ETH Hax
    • Webmine
    • BTC Now
    • BTC Pipe
    • BTC Lotto
    • CrackMyWallet
    • Kaginawa
    • Crypto.me
    • ddrp.io
    • cors.io
Powered by GitBook
On this page
  1. TALKS

Platypus

remote password extraction from password managers

PreviousCheapBugsNextHashbounty

Last updated 1 year ago

Delivered at BSides Las Vegas Underground track the same morning as Silk Road got taken down. (2013)

The silk road thing was actually super relevant because I had an awesome demo where I could extract the silk road passwords of everyone on the local network (so long as they had their password saved in their password manager and were using the same browser that they use for day to day stuff).

My tool would basically look for an unecrypted HTTP request, intercetpt it, and then deliver the stage 1 payload which would inject a hidden iframe into the target page.

The hidden iframe would then make several more hidden iframes

This was very effective for Facebook, Amazon, eBay, Slashdot, Reddit, mail.ru, and basically every onion site. As long as the browser had ever seen the login form delivered over a non-HTTPS page, even if it was disabled years ago (like the case of Facebook) the passwords would then get autofilled into the hidden iframe, scraped out with javascript, and delivered to my password collector.

code:

📣
https://github.com/pierce403/platypus