KeeFarce – Extract KeePass Passwords (2.x) From Database

Outsmart Malicious Hackers


KeeFarce allows you to extract KeePass passwords (2.x) by using DLL injection to execute code and retrieve the database information from memory. The cleartext information, including usernames, passwords, notes and url’s are dumped into a CSV file in %AppData%.

KeeFarce - Extract KeePass 2.x Passwords From Database

KeeFarce uses DLL injection to execute code within the context of a running KeePass process. C# code execution is achieved by first injecting an architecture-appropriate bootstrap DLL. This spawns an instance of the dot net runtime within the appropriate app domain, subsequently executing KeeFarceDLL.dll (the main C# payload).

The KeeFarceDLL uses CLRMD to find the necessary object in the KeePass processes heap, locates the pointers to some required sub-objects (using offsets), and uses reflection to call an export method.

Executing

In order to execute on the target host, the following files need to be in the same folder:

  • BootstrapDLL.dll
  • KeeFarce.exe
  • KeeFarceDLL.dll
  • Microsoft.Diagnostic.Runtime.dll

Copy these files across to the target and execute KeeFarce.exe

You can download KeeFarce here (which contains prebuilt 32-bit and 64-bit executables):

KeeFarce-master.zip (Your AV may flag this malicious)

Or read more here.


Posted in: Cryptography, Hacking Tools

, , , , , , ,

Recent in Cryptography:
- Signal Messaging App Formal Audit Results Are Good
- SHA-256 and SHA3-256 Are Safe For the Foreseeable Future
- Up1 – Client Side Encrypted Image Host

Related Posts:

Most Read in Cryptography:
- The World’s Fastest MD5 Cracker – BarsWF - 47,914 views
- Hackers Crack London Tube Oyster Card - 45,442 views
- WPA2 Vulnerability Discovered – “Hole 196” – A Flaw In GTK (Group Temporal Key) - 33,392 views


Comments are closed.