Skip to content

Latest commit

 

History

History
67 lines (52 loc) · 1.87 KB

File metadata and controls

67 lines (52 loc) · 1.87 KB

Ankermake slicer

Stored credentials

Ankermake slicer stores your login information in an obfuscated format.

The file to look for is

%AppData%/Local/AnkerMake/AnkerMake_64bit_fp/login.json

Which, even though it is named .json, is a base64-encoded, encrypted json file.

This file can be decoded using a couple of unix commands. First, decode the base64:

$ base64 -d login.json > login.raw

Now login.raw will contain the raw (encrypted) contents. These can be decrypted using openssl:

$ openssl aes-128-ecb -d -nopad -in login.raw -K 1b55f97793d58864571e1055838cac97

The key 1b55f97793d58864571e1055838cac97 was extracted from Ankermake Slicer using Ghidra.

The openssl command above should yield output similar to this:

{
    "code": 0,
    "data": {
        "ab_code": "REDACTED",
        "auth_token": "REDACTED",
        "avatar": "",
        "domain": "",
        "email": "REDACTED",
        "geo_key": "REDACTED",
        "invitation_code": "REDACTED",
        "inviter_code": "",
        "mac_addr": "",
        "nick_name": "",
        "params": null,
        "phone": "",
        "phone_code": "",
        "privilege": 0,
        "server_secret_info": {
            "public_key": "REDACTED"
        },
        "token_expires_at": "REDACTED",
        "trust_list": [
        ],
        "user_id": "REDACTED",
        "verify_code_url": ""
    },
    "msg": "Succeed."
}

Alternatively, the excellent CyberChef tool can be used.

Just click on this recipe and paste the contents of your login.json to see the contents.