Skip to content

Commit 6db3690

Browse files
authored
Update README.md
1 parent 60c170c commit 6db3690

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To extract passwords from memory we wrote two mini programs, in Python and C++ l
2727

2828
Thx Frida team for a wonderful tool! Our python script attaches to the TeamViewer.exe process, gets the base address and memory size of each library in this process. After that, it dumps one by one memory area, searches parts with [00 88] bytes at the start and [00 00 00] bytes in the end and copies them in the array. The next and the last step is choosing end decoding raws according to the regexp and password policy.
2929

30-
![python_work_example](https://github.com/vah13/extractTVpasswords/blob/master/img/python_work_example.png?raw=true)
30+
![python_work_example](https://github.com/vah13/extractTVpasswords/blob/master/img/python_work_example2.png?raw=true)
3131

3232
After executing the C++ code, you will get this view “asdQWE123” is the password
3333

@@ -45,7 +45,7 @@ c++ example
4545

4646
python example
4747

48-
![pyex](https://github.com/vah13/extractTVpasswords/blob/master/img/python_work_example2.png)
48+
![pyex](https://github.com/vah13/extractTVpasswords/blob/master/img/python_work_example2.png?raw=true)
4949

5050

5151
[@NewFranny](https://twitter.com/NewFranny)

0 commit comments

Comments
 (0)