Skip to content

Module to dump Yandex credentials#814

Open
Moghees244 wants to merge 6 commits intoPennyw0rth:mainfrom
Exfiltra:main
Open

Module to dump Yandex credentials#814
Moghees244 wants to merge 6 commits intoPennyw0rth:mainfrom
Exfiltra:main

Conversation

@Moghees244
Copy link

Description

This module adds functionality to extract all saved passwords from the Yandex browser for all user profiles on the system. Running this module requires admin privileges on target host.

Type of change

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • Deprecation of feature or functionality
  • This change requires a documentation update (Add Documentation for Yandex Module NetExec-Wiki#61)
  • This requires a third party update (such as Impacket, Dploot, lsassy, etc)

Setup guide for the review

Test Environment & Setup

  • Local Machine:

    • OS: Kali Linux 6.12.20-amd64
    • Python Version: 3.13.2
  • Tested Targets:

    • Windows 11
    • Windows Server 2022

Setup Instructions

  1. On your Windows target, set up an SMB server and install the Yandex browser.
  2. Launch the browser and save one or more credentials to populate the password store.
  3. Ensure the user account you're testing with has admin access to the target host.

Usage

To test the module, run the following command:

netexec smb <target_ip> -u <user> -p <password> -M yandex

Expected Behavior

  • The module will extract and display all saved passwords from the Yandex browser.
  • Extracted credentials will also be saved to the database in dpapi table.

Screenshots:

Checklist:

  • I have ran Ruff against my changes (via poetry: poetry run python -m ruff check . --preview, use --fix to automatically fix what it can)
  • I have added or updated the tests/e2e_commands.txt file if necessary (new modules or features are required to be added to the e2e tests)
  • New and existing e2e tests pass locally with my changes
  • If reliant on changes of third party dependencies, such as Impacket, dploot, lsassy, etc, I have linked the relevant PRs in those projects
  • I have performed a self-review of my own code
  • I have commented my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation (PR here: https://github.com/Pennyw0rth/NetExec-Wiki)

@NeffIsBack
Copy link
Member

Thanks for the PR!

@NeffIsBack NeffIsBack linked an issue Jul 21, 2025 that may be closed by this pull request
@Moghees244
Copy link
Author

Hi @NeffIsBack
Did you get chance to review the PR?

@NeffIsBack
Copy link
Member

Hi @NeffIsBack Did you get chance to review the PR?

The code looks good so far, but due to the enormous amount of Pull Requests in the past there is (un)fortunately still a huge backlog of PRs i have to test first before i can test this one. Bare with me, the day will come

@Moghees244
Copy link
Author

Hi @NeffIsBack!
Any updates?

@NeffIsBack
Copy link
Member

Unfortunately not, there are still ~25 PRs left before this one.

However, it looks like there are merge conflicts on this branch which anyway have to be resolved first. Also, i don't have permissions to update/push commits to this branch. Did you change any security settings on your fork?

Signed-off-by: Moghees Ahmad <108871687+Moghees244@users.noreply.github.com>
@Moghees244
Copy link
Author

Unfortunately not, there are still ~25 PRs left before this one.

However, it looks like there are merge conflicts on this branch which anyway have to be resolved first. Also, i don't have permissions to update/push commits to this branch. Did you change any security settings on your fork?

I havent changed security settings on fork but anyways, I have resolved the conflicts.

@maver1ks
Copy link

Unfortunately not, there are still ~25 PRs left before this one.
However, it looks like there are merge conflicts on this branch which anyway have to be resolved first. Also, i don't have permissions to update/push commits to this branch. Did you change any security settings on your fork?

I havent changed security settings on fork but anyways, I have resolved the conflicts.

Hi! I'm trying to use the module in a lab environment, but it doesn't export anything from the browser, even though all passwords are saved in the browser. It says "No master key found to decrypt DPAPI blob."

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Yandex Browser extract

3 participants