| skipped 1243 lines |
1244 | 1244 | | vault_name = secret_file['vault_name']#args[0] |
1245 | 1245 | | vault_type = secret_file['vault_type']#args[1] |
1246 | 1246 | | self.logging.debug(f"Processing Vault {vault_name} - type : {vault_type} ") |
1247 | | - | print(vault_type) |
1248 | 1247 | | if vault_type == 'WinBio Key': |
1249 | 1248 | | data = self.dump_VAULT_WIN_BIO_KEY(user,localfile,data) |
| 1249 | + | self.logsecret(f"Vault {vault_name} : {data} ") |
1250 | 1250 | | elif vault_type == 'NGC Local Account Logon Vault Credential': |
1251 | 1251 | | data = self.dump_VAULT_NGC_LOCAL_ACCOOUNT(user,localfile,data) |
| 1252 | + | self.logsecret(f"Vault {vault_name} : {data} ") |
1252 | 1253 | | elif "NGC" in vault_type : |
1253 | 1254 | | data = self.dump_VAULT_NGC_ACCOOUNT(user,localfile,data) |
| 1255 | + | self.logsecret(f"Vault {vault_name} : {data} ") |
1254 | 1256 | | elif vault_type == 'Internet Explorer': |
1255 | 1257 | | data = self.dump_VAULT_INTERNET_EXPLORER(user,localfile,data) |
1256 | | - | self.logsecret(f"Vault {vault_name} : {data} ") |
| 1258 | + | |
1257 | 1259 | | #user.secrets["Vault:%s" % vault_name] = data |
1258 | 1260 | | secret_file['secret'] = data |
1259 | 1261 | | self.dump_to_file(localfile, data) |
| skipped 20 lines |
1280 | 1282 | | credz_path=localfile, |
1281 | 1283 | | pillaged_from_computer_ip=self.options.target_ip, |
1282 | 1284 | | pillaged_from_username=user.username) |
| 1285 | + | self.logging.info(f"[{self.options.target_ip}] [+] {bcolors.OKGREEN} [IE/EDGE Password] {bcolors.ENDC} for {vault_blob['Resource'].decode('utf-16le')} [ {bcolors.OKBLUE}{vault_blob['Username'].decode('utf-16le')} : {vault_blob['Password'].decode('utf-16le')}{bcolors.ENDC} ]") |
1283 | 1286 | | return retval |
1284 | 1287 | | except Exception as ex: |
1285 | 1288 | | self.logging.debug(f"[{self.options.target_ip}] {bcolors.WARNING}Exception dump_VAULT_INTERNET_EXPLORER{bcolors.ENDC}") |
| skipped 700 lines |