ChromePasswordDumper is a portable tool to allow the recovery of passwords from Google Chrome for Windows using PSSQlite.
Copy the ChromePasswordDumper folder into the root directory of your memory stick like so:
Make sure external library for the windows version PSSQlite is up to date.
Google Stores the details for saved passwords in a SQLite Database called Login Data which holds encrypted password information. How these encrypted passwords are generated is dependant on the given OS.
Once the program has run it will place the exctracted data into a file called (Current User)-pwd.txt e.g JossMoff-pwd.txt. The ouput file has this format:
+----------------+--+-----------+--+-----------+
| Website | | Username* | | Password* |
+----------------+--+-----------+--+-----------+
| www.github.com | | JossMoff | | 12345 |
+----------------+--+-----------+--+-----------+
| www.nectar.com | | | | |
+----------------+--+-----------+--+-----------+
* - May not have an entry
In windows, Login Data is stored at:
%LocalAppData%\Google\Chrome\User Data\Default\Login Data
The password is encrypted using the Windows function CryptProtectData. Avoiding complexities, we need to use the counterpart to this function CryptUnprotectData in order to decode the passwords.
In order to do this, we call a Powershell instance from run.bat with the following code:
powershell.exe -noprofile -executionpolicy bypass -file .\windows.ps1
allowing us to run our ps1 script by bypassing execution policies.
How I plan to extend the quick project:
- Change the code so the main folder does not need to be in the root directory of the memory stick.
- Provide OS X support
- Provide Linux Support