Exploiting DPAPI and Local State Decryption for Web Cookie Session Theft in Cross-Device Chrome Migrations

Kyle Herman, Lei Chen

Research output: Contribution to book or proceedingConference articlepeer-review

Abstract

Multifactor Authentication (MFA) has grown in popularity for application and operating system security. In response, cyber criminals have turned to web browser session theft to defeat MFA. With a valid session ID, cyber criminals can bypass username/password and MFA requirements and gain access to sensitive systems such as email. Once accessed, attackers can extract sensitive information from the victim's account and use it for targeted phishing or mass spam campaigns. Prior research has focused on Man-in-the-Middle (MitM) attacks or Cross-Site-Scripting (XSS) attacks from vulnerable servers. A more realistic explanation for the increase in session theft is malware and users who are tricked into installing it. Google Chrome uses Windows Data Protection API (DPAPI) to encrypt and store passwords, session cookies and authentication tokens. To simulate malware, this study utilized a PowerShell script to decrypt the Local State file to defeat DPAPI. The decryption key was then utilized to decrypt the cookies in the SQLite database and provide valid session IDs.

Original languageEnglish
Title of host publicationConference Proceedings - IEEE SOUTHEASTCON
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages862-867
Number of pages6
ISBN (Electronic)9798331504847
ISBN (Print)9798331504847
DOIs
StatePublished - Mar 22 2025
Event2025 IEEE SoutheastCon, SoutheastCon 2025 - Concord, United States
Duration: Mar 22 2025Mar 30 2025

Publication series

NameSoutheastCon 2025

Conference

Conference2025 IEEE SoutheastCon, SoutheastCon 2025
Country/TerritoryUnited States
CityConcord
Period03/22/2503/30/25

Scopus Subject Areas

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering
  • Control and Systems Engineering
  • Signal Processing

Keywords

  • Cookie Theft
  • Session Fixation Attacks
  • Session Hijacking
  • Session ID Theft
  • Session Theft
  • Token Replay Attacks

Fingerprint

Dive into the research topics of 'Exploiting DPAPI and Local State Decryption for Web Cookie Session Theft in Cross-Device Chrome Migrations'. Together they form a unique fingerprint.

Cite this