LaZagne v2.2: Recovers passwords stored in Windows and Linux
The LaZagne project is an open source application that is used to recover a lot of passwords stored on a local computer. Each software stores its passwords using different techniques (clear text, API, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords.
This project has been added to pupy as a post-exploitation module. The Python code will be interpreted in the memory without touching the disk and works in Windows and Linux. The latest version of Linux is not up to date, so I recommend using pupy to use it.
Mode of use
see the version
user @ computer: $ laZagne.exe --version
execute all its modules
user @ computer: $ laZagne.exe all
execute a module in specific
user @ computer: $ laZagne.exe browsers
Start only a specific software script
user @ computer: $ laZagne.exe browsers -f (for firefox)
Write all the passwords found in a file (-oN for normal text, -oJ for Json, -oA for all)
user @ computer: $ laZagne.exe all -oN
Help
user @ computer: $ laZagne.exe -h
laZagne.exe browsers -h
laZagne.exe browsers -h
Use a file for dictionary attacks (used only when necessary: mozilla masterpassword, system hahes, etc.). The file has to be a list of words in cleartext (not rainbow), it has not been optimized to be fast, but it could be useful for basic passwords.
user @ computer: $ laZagne.exe all -path file.txt
Change the verbosity mode (2 different levels)
user @ computer: $ laZagne.exe all -vv
Silent mode (nothing will be printed on the standard output)
user @ computer: $ laZagne.exe all -quiet -oA
Recover passwords in another unit (default: C)
user @ computer: $ laZagne.exe all -drive D
Note: For wifi \ Windows Secrets passwords, start with administrator privileges (UAC / sudo authentication)





