Skip to content

Commit 8ca8206

Browse files
committed
Update docs
1 parent a95384e commit 8ca8206

File tree

1 file changed

+2
-9
lines changed

1 file changed

+2
-9
lines changed

documentation/modules/post/multi/gather/chrome_cookies.md

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ The module writes a random 10-15 character file containing HTML to a directory y
1010

1111
## Vulnerable Application
1212

13-
This technique works on Chrome 59 or later on all operating systems. Note that this module does not yet support Windows, only Linux and macOS.
13+
This technique works on Chrome 59 or later on all operating systems. This module has been tested on Windows, Linux, and OSX. Windows shell sessions are currently not supported.
1414

1515
Chrome does not need to be running on the target machine for this module to work.
1616

@@ -24,7 +24,6 @@ Chrome does not need to be running on the target machine for this module to work
2424

2525
## Options
2626

27-
2827
**CHROME_BINARY_PATH**
2928

3029
The path to the user's Chrome binary. On Linux this defaults to searching for `google-chrome` in `$PATH`. On macOS, this defaults to `/Applications/Google Chrome.app/Contents/MacOS/Google Chrome'`. If the module doesn't find any cookies, it may be that a different Chrome binary to the one the user normally uses is being run. In that case, you can change the Chrome binary executed with this option.
@@ -33,7 +32,7 @@ Chrome does not need to be running on the target machine for this module to work
3332

3433
Directory used to write temporary files.
3534

36-
Only one file is written, with a random 10-15 character alphanumeric filename. This file is html to be read by Chrome, and is deleted after use.
35+
Two files are written, with random 10-15 character alphanumeric filenames. One file contains an html file for Chrome and the other is where the cookies are saved. Both files are deleted during cleanup.
3736

3837
**REMOTE_DEBUGGING_PORT**
3938

@@ -69,18 +68,12 @@ msf post(multi/gather/chrome_cookies) > run
6968
[*] Post module execution completed
7069
```
7170

72-
7371
## Future features
7472

75-
### Windows support
76-
This technique works on Windows as well, this module just doesn't implement the Windows-specific functionality.
77-
7873
### Profiles
7974
This module only extracts cookies from the default Chrome profile. The target may have multiple, and you may which to extract cookies from all of them. This would require enumerating and extracting the profiles by name. Example code to extract cookies from a non-default Chrome profile can be found at https://github.com/defaultnamehere/cookie_crimes.
8075

8176
## See also
8277
See https://github.com/defaultnamehere/cookie_crimes for more information and manual instructions for Windows.
8378

8479
See https://mango.pdf.zone/stealing-chrome-cookies-without-a-password for the blog post in which this technique was first published.
85-
86-

0 commit comments

Comments
 (0)