Post Exploitation is when criminal hackers or in part of a black box penetration testing, gain access to a network or device, and perform attacks and techniques afterwards. In offensive security, getting a shell is just the beginning, gaining access is just the start. Sharp Cookie Monster a tool written by @m0rv4i which is based on the original: cookie-crimes, can allow you to steal cookies, after getting access, without the need to guess, brute-force accounts.
If you steal someone’s Chrome cookies, you can log in to their accounts on every website they’re logged in to.
Normally you need the user’s password to do it, @mangopdf found a way to do it without the password. You just need to be able to execute code on their computer. It works by using Chrome’s Remote Debugging Protocol.
.&@#. .#@@.
*&&((&@( @/ *@
@ &( ,& &@@@@/ &/
@ &@ @@@@@@@@ @.
@. #@@/ @ @@@@@@@/ @, #@@
@ @@@@@@@@ && %%/(%%&#//(#...
/% @@@@@@@@ *#(@* ,@/(((//(/(/(((//(@.
.@(..#@, %@@# &/////#@@*. .*&@#////////////////(/&@.
(&%((///(@(. *&#(//(/////((//(/(((///(/(/(/(/(/(///////((%@
(@#//((/////((//(/(////(///////////////////////////////////@#/(/&@.
@&@@////(/(/(/(/(/(/(/(/(/(/(/(/(/(/(/(/(/(/(/(/(/(/((///(@%//////(#@
%@@%(////////////////////////////((//(@@@#///@@%#///((&@@@@@@#////////(#&&(
@@&(///(//(/(/(//((/(///(///(//@//&@@@@@@@@@@@@@@@@@@@@@@@@(////(/(////#@@@/
@#/(&&(////(///((@///%@(##%@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@///////////%@@@&.
@#(/(#%@@&(//#&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@///(/(/(/(//@.
@#/(//(//(//@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@////(/////(//@.
,@&///(/(/(///%@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#(///(/(///#/&@
@&((//////////@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@%///////////%&,
#@/(/(/(/(////@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@((/(/(/(/(/((@.
&(/////////////@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#////////////((&
.@(%@(///(/(/(////%@@@@@@@@@@@@@@@@@@@@@@@@@@@@&/(/(/(/(///(//#@%@.
.**.@/(/////////////(@@@@@@@@@@@@@@@@@@@@@@(///////////////(@/
@%((///(/(/(/(/////(/#&@@@@@@@@%((///(///(/(///((/(@/@&.
,&@@(//////////////(////(((//((//(((////////////@(.
,@@(/////////////(/(/(/(/(/(/(/(/(///((&%%@%,
.%@@(@@@#&@&(/////////////////////&@*
,*, ,@@@@@@@@&&&&@@%/, ..
SharpCookieMonster v1.0 by @m0rv4i
Description
This is a Sharp port of @defaultnamehere’s cookie-crimes module – full credit for their awesome work!
This C# project will dump cookies for all sites, even those with httpOnly/secure/session flags.
Usage
Simply run the binary.
SharpCookieMonster.exe [https://sitename.com] [chrome-debugging-port] [user data dir]
An optional first argument sepcifies the site that chrome will initially connect to when launched (default https://www.google.com).
An optional second argument specifies the port to launch the chrome debugger on (by default 9142).
Finally, an optional third argument specifies the path to the user data directory, which can be overridden in order to access different profiles etc (default %APPDATALOCAL%\Google\Chrome\User Data).
Building
The binary has been built to be compatible with .NET 3.5 in order to be compatible with victims with older versions of .NET installed. However in order to use WebSockets to communicate with Chrome the WebSocket4Net package was added.
If you want to run this down C2 such as using PoshC2‘s sharpcookiemonster
command or via CobaltStrike’s execute-assembly
then use ILMerge to merge the built executable with the WebSocket4Net.dll library.
First rename the original binary then run:
ILMerge.exe /targetplatform:"v2,C:\Windows\Microsoft.NET\Framework\v2.0.50727" /out:SharpCookieMonster.exe Sharp
#chrome #google #cookiesteal #offensivesecurity #blackhatethicalhacking