{"id":598,"date":"2020-07-28T17:53:48","date_gmt":"2020-07-28T17:53:48","guid":{"rendered":"https:\/\/cybersecthreat.com\/?p=598"},"modified":"2024-04-01T13:51:05","modified_gmt":"2024-04-01T05:51:05","slug":"extract-password-from-exe-part1","status":"publish","type":"post","link":"https:\/\/cybersecthreat.com\/zh\/2020\/07\/28\/extract-password-from-exe-part1\/","title":{"rendered":"Extract password from exe(1)"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"h-extract-password-from-exe-part-1\">Extract password from exe &#8211; Part 1<\/h2>\n\n\n\n<p>Extract password from exe is one of the techniques that we may use during our red team engagement. Actually, there are tons of information that is available in an executable file. This information may include credentials, keys, database information, IP address, etc. Although we will use the red team&#8217;s perspective to extract information such as credentials in this article. The key techniques still apply to malware sample analysis. <\/p>\n\n\n\n<p>In this part 1 series, we will focus on some popular script-to-executable file converters including py2exe, PyInstaller, and AutoIT. As you may also be aware, many Anti-Virus evasion tools such as <strong>Veil Evasion<\/strong> can generate executable files in these formats.<\/p>\n\n\n\n<p>So, we start with some basic script and our goal is to bypass the authentication. For each of the script converters, our flow of discussion is to write a simple script, discuss how to convert it to an executable file, analyze of executable file, and lastly how to decompile it. Of course, you may say I can bypass authentication using disassemblers such as <a href=\"http:\/\/www.ollydbg.de\/\">OllyDbg<\/a>, <a href=\"https:\/\/www.immunityinc.com\/products\/debugger\/\">Immunity Debugger<\/a>, <a href=\"https:\/\/x64dbg.com\/#start\">x64dbg<\/a> or <a href=\"https:\/\/www.hex-rays.com\/products\/ida\/\">IDA Pro<\/a>. However, we try to do it more simply and effectively. <\/p>\n\n\n<style>.kadence-column598_efe952-de > .kt-inside-inner-col{display:flex;}.kadence-column598_efe952-de > .kt-inside-inner-col,.kadence-column598_efe952-de > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column598_efe952-de > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column598_efe952-de > .kt-inside-inner-col{flex-direction:column;align-items:center;}.kadence-column598_efe952-de > .kt-inside-inner-col > .kb-image-is-ratio-size{align-self:stretch;}.kadence-column598_efe952-de > .kt-inside-inner-col > .wp-block-kadence-advancedgallery{align-self:stretch;}.kadence-column598_efe952-de > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column598_efe952-de > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column598_efe952-de{position:relative;}@media all and (max-width: 1024px){.kadence-column598_efe952-de > .kt-inside-inner-col{flex-direction:column;justify-content:center;align-items:center;}}@media all and (max-width: 767px){.kadence-column598_efe952-de > .kt-inside-inner-col{flex-direction:column;justify-content:center;align-items:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column598_efe952-de\"><div class=\"kt-inside-inner-col\"><style>.kb-table-of-content-nav.kb-table-of-content-id598_e38c7a-b4 .kb-table-of-content-wrap{padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-right:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);padding-left:0px;background-color:rgba(255,255,255,0.99);border-top:3px solid #313131;border-right:3px solid #313131;border-bottom:3px solid #313131;border-left:3px solid #313131;box-shadow:0px 0px 14px 0px #abb8c3;}.kb-table-of-content-nav.kb-table-of-content-id598_e38c7a-b4 .kb-table-of-contents-title-wrap{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kb-table-of-content-nav.kb-table-of-content-id598_e38c7a-b4 .kb-table-of-contents-title{font-size:var(--global-kb-font-size-lg, 2rem);font-weight:bold;font-style:normal;}.kb-table-of-content-nav.kb-table-of-content-id598_e38c7a-b4 .kb-table-of-content-wrap .kb-table-of-content-list{color:#d65a02;font-size:var(--global-kb-font-size-md, 1.25rem);font-weight:regular;font-style:normal;margin-top:var(--global-kb-spacing-sm, 1.5rem);margin-right:0px;margin-bottom:0px;margin-left:0px;}.kb-table-of-content-nav.kb-table-of-content-id598_e38c7a-b4 .kb-toggle-icon-style-basiccircle .kb-table-of-contents-icon-trigger:after, .kb-table-of-content-nav.kb-table-of-content-id598_e38c7a-b4 .kb-toggle-icon-style-basiccircle .kb-table-of-contents-icon-trigger:before, .kb-table-of-content-nav.kb-table-of-content-id598_e38c7a-b4 .kb-toggle-icon-style-arrowcircle .kb-table-of-contents-icon-trigger:after, .kb-table-of-content-nav.kb-table-of-content-id598_e38c7a-b4 .kb-toggle-icon-style-arrowcircle .kb-table-of-contents-icon-trigger:before, .kb-table-of-content-nav.kb-table-of-content-id598_e38c7a-b4 .kb-toggle-icon-style-xclosecircle .kb-table-of-contents-icon-trigger:after, .kb-table-of-content-nav.kb-table-of-content-id598_e38c7a-b4 .kb-toggle-icon-style-xclosecircle .kb-table-of-contents-icon-trigger:before{background-color:rgba(255,255,255,0.99);}@media all and (max-width: 1024px){.kb-table-of-content-nav.kb-table-of-content-id598_e38c7a-b4 .kb-table-of-content-wrap{margin-left:var(--global-kb-spacing-auto, auto);border-top:3px solid #313131;border-right:3px solid #313131;border-bottom:3px solid #313131;border-left:3px solid #313131;}}@media all and (max-width: 767px){.kb-table-of-content-nav.kb-table-of-content-id598_e38c7a-b4 .kb-table-of-content-wrap{margin-left:var(--global-kb-spacing-auto, auto);border-top:3px solid #313131;border-right:3px solid #313131;border-bottom:3px solid #313131;border-left:3px solid #313131;}}<\/style><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-pyinstaller\">PyInstaller<\/h2>\n\n\n\n<p>The first one we are going to discuss is <strong>pyinstaller<\/strong>, which is a popular Python script converter. Now, we start with a simple Python script called &#8220;<strong>my_secret_pyinstaller.py<\/strong>&#8220;. <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>import sys\n\nMyPassword = 'AAAABB'\n\n# Python2\n#password = raw_input(\"Enter Password: \")\npassword = input(\"Enter Password: \")\nif password.rstrip(' \\n\\t') != MyPassword:\n    print(\"Wrong Password\")\n    sys.exit()\nelse:\n    print(\"Welcome!\")<\/code><\/pre>\n\n\n\n<p>In order to install <a href=\"https:\/\/www.pyinstaller.org\/\">pyinstaller<\/a>, we can use command <code>pip install pyinstaller<\/code> command. After installation, we can compile the script using pyinstaller, and the output &#8220;<strong><strong>my_secret_pyinstaller<\/strong>.exe<\/strong>&#8221; will be generated under <strong>dist\/<\/strong> folder. Below is the command to generate the executable file.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>pyinstaller -F my_secret_pyinstaller.py<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-identification-of-pyinstaller-executable\">Identification of PyInstaller executable<\/h3>\n\n\n\n<p>Whenever I get an executable on hand, the first step is always to check what can we deduce from the executable file. From a blue team&#8217;s perspective, we will first try to find IP address or malicious domain. On the other hand, extract password from exe files is always one of our key goals during red team engagement. Strings.exe is an effective way to extract text strings from any executable file. In this case, seems we are not able to find the password string. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_strings_grep_password.png\"><img loading=\"lazy\" decoding=\"async\" width=\"943\" height=\"40\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_strings_grep_password.png\" alt=\"pyinstaller strings grep password\" class=\"wp-image-681\" style=\"width:580px;height:24px\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_strings_grep_password.png 943w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_strings_grep_password-300x13.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_strings_grep_password-768x33.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_strings_grep_password-600x25.png 600w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><\/a><\/figure>\n\n\n\n<p>Then, we move on to check the executable file using <a href=\"http:\/\/ntinfo.biz\/index.html\">Detect it Easy<\/a>, and it is identified as Visual C\/C++ compiled program.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_Detect_it_easy.png\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"406\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_Detect_it_easy.png\" alt=\"pyinstaller Detect it easy\" class=\"wp-image-682\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_Detect_it_easy.png 622w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_Detect_it_easy-300x196.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_Detect_it_easy-600x392.png 600w\" sizes=\"auto, (max-width: 622px) 100vw, 622px\" \/><\/a><\/figure>\n\n\n\n<p>Let&#8217;s further analysis it by attaching my_secret_pyinstaller.exe to x64dbg. When you navigate to &#8220;Symbols&#8221; tab, it shows that <strong>python36.dll<\/strong> is a loaded module. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_x64dbg.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"546\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_x64dbg-1024x546.png\" alt=\"pyinstaller x64dbg\" class=\"wp-image-683\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_x64dbg-1024x546.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_x64dbg-300x160.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_x64dbg-768x409.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_x64dbg-600x320.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_x64dbg.png 1366w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>So, we know the executable is somehow related to python. If the executable file contains the keyword &#8220;<strong>pyi-windows-manifest-filename&#8221;<\/strong>, then we can confirm it is a pyinstaller compiled executable. Obviously, it is!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_strings_manifest.png\"><img loading=\"lazy\" decoding=\"async\" width=\"964\" height=\"86\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_strings_manifest.png\" alt=\"pyinstaller strings manifest\" class=\"wp-image-684\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_strings_manifest.png 964w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_strings_manifest-300x27.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_strings_manifest-768x69.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_strings_manifest-600x54.png 600w\" sizes=\"auto, (max-width: 964px) 100vw, 964px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-decompile-pyinstaller-executable\">Decompile pyinstaller executable<\/h3>\n\n\n\n<p>Since we know it is a pyinstaller executable, the next step is to decompile it back to a python script. Basically, it involves 2 steps. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-step-1-extract\">Step 1 &#8211; Extract<\/h4>\n\n\n\n<p>We will use <a href=\"https:\/\/github.com\/extremecoders-re\/pyinstxtractor\">pyinstxtractor<\/a> to extract executable file into <strong>my_secret_pyinstaller.exe_extracted\/<\/strong> folder using the following command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>python pyinstxtractor.py my_secret_pyinstaller.exe<\/code><\/pre>\n\n\n\n<p>Then, a new file &#8220;<strong>my_secret_pyinstaller.pyc<\/strong>&#8221; will be be generated inside <strong>my_secret_pyinstaller.exe_extracted\/<\/strong> folder. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-step-2-decompile\">Step 2 &#8211; Decompile<\/h4>\n\n\n\n<p>Next, we move on and decompile it using <a href=\"https:\/\/pypi.org\/project\/uncompyle6\/\">uncompyle6<\/a>. You can easily install  it by <code>pip install uncompyle6<\/code>. The following command can be used to decompile the script source code.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>uncompyle6.exe my_secret_pyinstaller.pyc<\/code><\/pre>\n\n\n\n<p>In some cases, you will find the following error message because the magic number is incorrect.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Traceback (most recent call last):\nFile \"c:\\python27\\lib\\site-packages\\xdis\\load.py\", line 293, in load_module_from_file_object\nco = marshal.loads(bytecode)\nValueError: bad marshal data (unknown type code)\nTraceback (most recent call last):\nFile \"c:\\python27\\lib\\runpy.py\", line 174, in run_module_as_main \"main\", fname, loader, pkg_name) File \"c:\\python27\\lib\\runpy.py\", line 72, in _run_code exec code in run_globals File \"C:\\Python27\\Scripts\\uncompyle6.exe__main_.py\", line 9, in\nFile \"c:\\python27\\lib\\site-packages\\uncompyle6\\bin\\uncompile.py\", line 194, in main_bin\n**options)\nFile \"c:\\python27\\lib\\site-packages\\uncompyle6\\main.py\", line 324, in main\ndo_fragments,\nFile \"c:\\python27\\lib\\site-packages\\uncompyle6\\main.py\", line 184, in decompile_file\nfilename, code_objects\nFile \"c:\\python27\\lib\\site-packages\\xdis\\load.py\", line 168, in load_module\nget_code=get_code,\nFile \"c:\\python27\\lib\\site-packages\\xdis\\load.py\", line 307, in load_module_from_file_object\n\"Ill-formed bytecode file %s\\n%s; %s\" % (filename, kind, msg)\nImportError: Ill-formed bytecode file my_secret_pyinstaller.pyc\n; bad marshal data (unknown type code)<\/code><\/pre>\n\n\n\n<p>We can easily fix it by edit my_secret_pyinstaller.myc with <a href=\"https:\/\/mh-nexus.de\/en\/hxd\/\">HxD<\/a>, and make sure the magic number is &#8220;33 0D 0D 0A 00 00 00 00 00 00 00 00&#8221; as following.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"681\" height=\"488\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_HxD_magic_number.png\" alt=\"pyinstaller HxD magic number\" class=\"wp-image-685\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_HxD_magic_number.png 681w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_HxD_magic_number-300x215.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_HxD_magic_number-600x430.png 600w\" sizes=\"auto, (max-width: 681px) 100vw, 681px\" \/><\/figure>\n\n\n\n<p>When we rerun <code>uncompyle6.exe my_secret_pyinstaller.pyc<\/code> the source code will be displayed on screen, and we successfully extract password from exe file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_uncompyle6_success_extract_password_from_exe_after_fixed.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"163\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_uncompyle6_success_extract_password_from_exe_after_fixed-1024x163.png\" alt=\"pyinstaller uncompyle6 success Extract password from exe after fixed\" class=\"wp-image-687\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_uncompyle6_success_extract_password_from_exe_after_fixed-1024x163.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_uncompyle6_success_extract_password_from_exe_after_fixed-300x48.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_uncompyle6_success_extract_password_from_exe_after_fixed-768x122.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_uncompyle6_success_extract_password_from_exe_after_fixed-600x96.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/pyinstaller_uncompyle6_success_extract_password_from_exe_after_fixed.png 1350w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-py2exe\">Py2exe<\/h2>\n\n\n\n<p>The second python script converter we are going to discuss is <strong>py2exe<\/strong>. The latest version py2exe supports is Python version 3.4.4. Basically, we will use 2 scripts to convert python script to py2exe format. The first script is <strong>my_secret_py2exe.py<\/strong>, which is shown as following:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>import sys\n\nMyPassword = 'AAAABB'\n\n# Python2\n#password = raw_input(\"Enter Password: \")\npassword = input(\"Enter Password: \")\nif password.rstrip(' \\n\\t') != MyPassword:\n    print(\"Wrong Password\")\n    sys.exit()\nelse:\n    print(\"Welcome!\")<\/code><\/pre>\n\n\n\n<p>Another simple script <strong>setup.py<\/strong> which is used as a wrapper script.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>from distutils.core import setup\nimport py2exe\n\nsetup(console=&#91;'my_secret_py2exe.py'])<\/code><\/pre>\n\n\n\n<p>To use py2exe, you can simply install it using the command <code>pip install pefile<\/code> \u53ca <code>pip install py2exe<\/code>. Then, we can compile the script, and the output &#8220;<strong>my_secret_py2exe.exe<\/strong>&#8221; will be generated under <strong>dist\/<\/strong> folder.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>c:\\Python34\\python.exe setup.py install\nc:\\Python34\\python.exe setup.py py2exe<\/code><\/pre>\n\n\n\n<p>As you can see below, the output folder <strong>dist\/<\/strong> contains several different files and you may also notice that the output executable has a relative small file size compared to pyinstaller.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"623\" height=\"300\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_folder_view.png\" alt=\"py2exe folder view\" class=\"wp-image-693\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_folder_view.png 623w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_folder_view-300x144.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_folder_view-600x289.png 600w\" sizes=\"auto, (max-width: 623px) 100vw, 623px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-identification-of-py2exe-executable\">Identification of py2exe executable<\/h3>\n\n\n\n<p>In this section, we will follow the flow as previous pyinstaller section. Strings.exe shows that password text is available inside the executable. <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>strings64.exe ..\/source\/dist\/my_secret_py2exe.exe<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_grep_password_extract_password_from_exe.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"546\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_grep_password_extract_password_from_exe-1024x546.png\" alt=\"py2exe strings grep password extract password from exe\" class=\"wp-image-700\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_grep_password_extract_password_from_exe-1024x546.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_grep_password_extract_password_from_exe-300x160.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_grep_password_extract_password_from_exe-768x409.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_grep_password_extract_password_from_exe-600x320.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_grep_password_extract_password_from_exe.png 1366w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><a href=\"http:\/\/ntinfo.biz\/index.html\">Detect it Easy<\/a> also identified it as Visual C\/C++ compiled program, but this time it is Visual C\/C++ 2010 SP1.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_detect_it_easy.png\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"406\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_detect_it_easy.png\" alt=\"py2exe detect it easy\" class=\"wp-image-692\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_detect_it_easy.png 622w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_detect_it_easy-300x196.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_detect_it_easy-600x392.png 600w\" sizes=\"auto, (max-width: 622px) 100vw, 622px\" \/><\/a><\/figure>\n\n\n\n<p>Again, when we attach my_secret_py2exe.exe to x64dbg. When you navigate to &#8220;Symbols&#8221; tab, it shows that <strong>python34.dll<\/strong> is a loaded module.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_x64dbg.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"546\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_x64dbg-1024x546.png\" alt=\"py2exe x64dbg\" class=\"wp-image-696\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_x64dbg-1024x546.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_x64dbg-300x160.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_x64dbg-768x409.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_x64dbg-600x320.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_x64dbg.png 1366w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>The magic keyword for py2exe compiled file is &#8220;<strong>PYTHONSCRIPT<\/strong>&#8220;. Certainly, we can try &#8220;<strong>pyi-windows-manifest-filename&#8221;<\/strong> and &#8220;<strong>PYTHONSCRIPT<\/strong>&#8221; to confirm the script converter in use.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_PYTHONSCRIPT.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"71\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_PYTHONSCRIPT-1024x71.png\" alt=\"py2exe strings PYTHONSCRIPT\" class=\"wp-image-695\" style=\"width:580px;height:40px\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_PYTHONSCRIPT-1024x71.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_PYTHONSCRIPT-300x21.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_PYTHONSCRIPT-768x54.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_PYTHONSCRIPT-600x42.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_strings_PYTHONSCRIPT.png 1060w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-decompile-py2exe-executable\">Decompile py2exe executable<\/h3>\n\n\n\n<p>So, moving on we will decompile the exeuctable. This time, we will use decompile-py2exe.py available <a href=\"https:\/\/github.com\/NVISO-BE\/decompile-py2exe\/blob\/master\/decompile-py2exe.py\">\u7db2\u5740<\/a>. We use Python 3.4.4 in our lab and encountered the following error.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>c:\\K-Sec\\Extract_password_from_exe&gt;c:\\python34\\python.exe decompile-py2exe.py source\/dist\/my_secret_py2exe.exe\nUnable to detect Python version<\/code><\/pre>\n\n\n\n<p>Now, we modified the python script a little bit, change <code>pythonversion = 0.0<\/code> to <code>pythonversion = 3.4<\/code> in line 98. Finally, we successfully decompile and extract the source code.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_decompile-py2exe_success_extract_password_from_exe_after_fixed.png\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"195\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_decompile-py2exe_success_extract_password_from_exe_after_fixed.png\" alt=\"py2exe decompile-py2exe success extract password from exe after fixed\" class=\"wp-image-691\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_decompile-py2exe_success_extract_password_from_exe_after_fixed.png 979w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_decompile-py2exe_success_extract_password_from_exe_after_fixed-300x60.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_decompile-py2exe_success_extract_password_from_exe_after_fixed-768x153.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/py2exe_decompile-py2exe_success_extract_password_from_exe_after_fixed-600x120.png 600w\" sizes=\"auto, (max-width: 979px) 100vw, 979px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-autoit\">AutoIt<\/h2>\n\n\n\n<p>Finally, we will explore the last script converter named <a href=\"https:\/\/www.autoitscript.com\/site\/\">AutoIT<\/a>, which is a popular tools to used by sysadmin. Let&#8217;s see the script &#8220;<strong>my_secret_autoit.au3<\/strong>&#8220;.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Global $MyPassword = 'AAAABB'\n\nCheckPassword()\n\nFunc CheckPassword()\n\n   Local $password = InputBox(\"Security Check\", \"Enter your password.\", \"\", \"*\")\n\n   if $password == $MyPassword Then\n\t  MsgBox(4096, \"Message\", \"Welcome!\")\n   Else\n\t  MsgBox(4096, \"Message\", \"Wrong Password\")\n   EndIf\nEndFunc<\/code><\/pre>\n\n\n\n<p>It is fairly easy to compile script into exe. Just launch &#8220;<strong>Aut2Exe<\/strong>&#8220;, just input the source and destination and click Convert will generate the executable file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_compile.png\"><img loading=\"lazy\" decoding=\"async\" width=\"596\" height=\"417\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_compile.png\" alt=\"autoit compile\" class=\"wp-image-707\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_compile.png 596w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_compile-300x210.png 300w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-identification-of-autoit-executable\">Identification of AutoIt executable<\/h3>\n\n\n\n<p>The first thing still strings.exe, nothing found.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_password.png\"><img loading=\"lazy\" decoding=\"async\" width=\"890\" height=\"43\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_password.png\" alt=\"autoit strings grep password\" class=\"wp-image-711\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_password.png 890w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_password-300x14.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_password-768x37.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_password-600x29.png 600w\" sizes=\"auto, (max-width: 890px) 100vw, 890px\" \/><\/a><\/figure>\n\n\n\n<p>Detect it Easy identified it as Visual C\/C++ 2013.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_Detect_it_easy.png\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"406\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_Detect_it_easy.png\" alt=\"autoit Detect it easy\" class=\"wp-image-708\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_Detect_it_easy.png 622w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_Detect_it_easy-300x196.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_Detect_it_easy-600x392.png 600w\" sizes=\"auto, (max-width: 622px) 100vw, 622px\" \/><\/a><\/figure>\n\n\n\n<p>No specific characteristic found via x64dbg this time.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_x64dbg.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"546\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_x64dbg-1024x546.png\" alt=\"autoit x64dbg\" class=\"wp-image-712\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_x64dbg-1024x546.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_x64dbg-300x160.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_x64dbg-768x409.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_x64dbg-600x320.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_x64dbg.png 1366w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Finally, we try to grep some keyword of AutoIt. You can try &#8220;<strong>compiled AutoIt script<\/strong>&#8221; or &#8220;<strong>AU3!EA06<\/strong>&#8220;. In general, the most common 2 strings are &#8220;<strong>This is a compiled AutoIt script<\/strong>&#8221; and &#8220;<strong>This is a third-party compiled AutoIt script<\/strong>&#8220;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>strings64.exe ..\/source\/my_secret_autoit.exe | findstr AutoIt\nstrings64.exe ..\/source\/my_secret_autoit.exe | findstr AU3!EA06<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_keyword.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"276\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_keyword-1024x276.png\" alt=\"autoit strings grep keyword\" class=\"wp-image-710\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_keyword-1024x276.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_keyword-300x81.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_keyword-768x207.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_keyword-600x162.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_strings_grep_keyword.png 1350w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-decompile-autoit-executable\">Decompile AutoIt executable<\/h3>\n\n\n\n<p>Once we identified the executable file is AutoIt generated exe, we can start to decompile the file. If it is a 32-bit executable file, we just need <a href=\"http:\/\/domoticx.com\/autoit3-decompiler-exe2aut\/\">Exe2Aut<\/a>. Our example here is a 64-bit executable, therefore we also need <a href=\"http:\/\/www.angusj.com\/resourcehacker\/\">Resource Hacker<\/a>. Take a special care when decompile AutoIt executable file using Exe2Aut because it may lead to code execution. Palo Alto had a great article describe this <a href=\"https:\/\/unit42.paloaltonetworks.com\/autoit-compiled-malware\/\">\u7db2\u5740<\/a>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-step-1-save-rcdata-to-a-au3-file\">Step 1 &#8211; Save RCData to a *.au3 file<\/h4>\n\n\n\n<p>The first step is open the my_secret_autoit.exe in <strong>Resource Hacker<\/strong>. Then we navigate to <strong>RCData<\/strong> &#8220;<strong>SCRIPT<\/strong>&#8220;, and right click to &#8220;<strong>Save Resource to a BIN file<\/strong>&#8220;. Make sure the extension is <strong>.au3<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"548\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_resource_hacker-1024x548.png\" alt=\"autoit resource hacker\" class=\"wp-image-718\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_resource_hacker-1024x548.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_resource_hacker-300x160.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_resource_hacker-768x411.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_resource_hacker-600x321.png 600w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_resource_hacker.png 1073w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-step-2-compile-au3-file-to-32bit-exe-using-aut2exe\">Step 2 &#8211; Compile *.au3 file to 32bit exe using &#8220;<strong>Aut2Exe<\/strong>&#8220;<\/h4>\n\n\n\n<p>Next, we will compile the output *.au3 file to a 32-bit executable file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"596\" height=\"417\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_compile_to_32bit.png\" alt=\"autoit compile to 32bit\" class=\"wp-image-716\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_compile_to_32bit.png 596w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_compile_to_32bit-300x210.png 300w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-step-3-decompile-exe-with-exe2aut\">Step 3 &#8211; Decompile exe with Exe2Aut<\/h4>\n\n\n\n<p>Finally, we just drag the exe into Exe2Aut to decompile the AutoIt script.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"572\" height=\"522\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png\" alt=\"autoit exe2aut success extract password from exe after resource hacker\" class=\"wp-image-717\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png 572w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker-300x274.png 300w\" sizes=\"auto, (max-width: 572px) 100vw, 572px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-alterative-myaut2exe\">Alterative &#8211; myaut2exe<\/h4>\n\n\n\n<p>Another alternative is myaut2exe available <a href=\"https:\/\/github.com\/dzzie\/myaut_contrib\">\u7db2\u5740<\/a>. It will not lead to code execution during de-compilation. However, seems it does not successfully decompile the latest version of AutoIt executable file.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">\u7d50\u8ad6<\/h2>\n\n\n\n<p>In this post, we have explore some of reverse engineering technique that can lead us successfully extract password from exe file. The discussed script converter includes pyinstaller, py2exe and AutoIt. <\/p>\n\n\n\n<p>So, how can we protect the information inside the executable file ? If you really need to embed some credential information inside an executable file, one option is to put the encrypted credential inside the script, and ask for decryption key at runtime. <\/p>\n\n\n\n<p>We will discuss other compiler and options to protect executable files in the coming article. Stay tuned! Stay safe!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-reference\">\u53c3\u8003\uff1a<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/programming.vip\/docs\/decompile-pyinstaller-packaged-exe-installation-package.html\">https:\/\/programming.vip\/docs\/decompile-pyinstaller-packaged-exe-installation-package.html<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/vk-intel.org\/tag\/autoit\/\">https:\/\/vk-intel.org\/tag\/autoit\/<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Extract password from exe &#8211; Part 1 Extract password from exe is one of the techniques that we may use during our red team engagement. Actually, there are tons of information that is available in an executable file. This information may include credentials, keys, database information, IP address, etc. Although we will use the red&#8230;<\/p>","protected":false},"author":2,"featured_media":717,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[42,40,57],"tags":[62,21,63,61,58,59,17,60],"class_list":["post-598","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blue-team","category-red-team","category-reverse-engineering","tag-autoit","tag-blue-team","tag-decompile","tag-py2exe","tag-pyinstaller","tag-python","tag-red-team","tag-reverse-engineering"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Extract password from exe(1) - CyberSecThreat<\/title>\n<meta name=\"description\" content=\"Extract password from exe is one of the technique that we may use during our red team engagement. ... script-to-executable ... py2exe, PyInstaller and AutoIT\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersecthreat.com\/zh\/2020\/07\/28\/extract-password-from-exe-part1\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extract password from exe(1)\" \/>\n<meta property=\"og:description\" content=\"Extract password from exe - Part 1 Extract password from exe is one of the techniques that we may use during our red team engagement. Actually, there are\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersecthreat.com\/zh\/2020\/07\/28\/extract-password-from-exe-part1\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSecThreat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybersecthreat\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-28T17:53:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-01T05:51:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png\" \/>\n\t<meta property=\"og:image:width\" content=\"572\" \/>\n\t<meta property=\"og:image:height\" content=\"522\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kelvin Yip\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:site\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kelvin Yip\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/\"},\"author\":{\"name\":\"Kelvin Yip\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#\\\/schema\\\/person\\\/4787dde06da74fa66cb5e92e481b0f98\"},\"headline\":\"Extract password from exe(1)\",\"datePublished\":\"2020-07-28T17:53:48+00:00\",\"dateModified\":\"2024-04-01T05:51:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/\"},\"wordCount\":1310,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png\",\"keywords\":[\"AutoIt\",\"Blue Team\",\"decompile\",\"py2exe\",\"pyinstaller\",\"Python\",\"Red Team\",\"Reverse Engineering\"],\"articleSection\":[\"Blue Team\",\"Red Team\",\"Reverse Engineering\"],\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/\",\"name\":\"Extract password from exe(1) - CyberSecThreat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png\",\"datePublished\":\"2020-07-28T17:53:48+00:00\",\"dateModified\":\"2024-04-01T05:51:05+00:00\",\"description\":\"Extract password from exe is one of the technique that we may use during our red team engagement. ... script-to-executable ... py2exe, PyInstaller and AutoIT\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png\",\"width\":572,\"height\":522,\"caption\":\"autoit exe2aut success extract password from exe after resource hacker\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Red Team\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/category\\\/red-team\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Extract password from exe(1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"name\":\"CyberSecThreat\",\"description\":\"CyberSecurity Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybersecthreat.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\",\"name\":\"CyberSecThreat Corporation Limited.\",\"alternateName\":\"CyberSecThreat\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cybersecthreat\",\"https:\\\/\\\/x.com\\\/cybersecthreat\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybersecthreat-corporation-limited\"],\"description\":\"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\\\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\\\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.\",\"legalName\":\"CyberSecThreat Corporation Limited.\",\"foundingDate\":\"2021-01-23\",\"address\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"25.0600452\",\"longitude\":\"121.4594381\"},\"telephone\":[\"(+886) 02 - 77527628\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"18:00\"}],\"email\":\"info@cybersecthreat.com\",\"areaServed\":\"Taiwan\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#\\\/schema\\\/person\\\/4787dde06da74fa66cb5e92e481b0f98\",\"name\":\"Kelvin Yip\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/91aef1abe820d485df4dc03c80c4bab5b129b723fea7002f20904634c1042d21?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/91aef1abe820d485df4dc03c80c4bab5b129b723fea7002f20904634c1042d21?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/91aef1abe820d485df4dc03c80c4bab5b129b723fea7002f20904634c1042d21?s=96&d=mm&r=g\",\"caption\":\"Kelvin Yip\"},\"sameAs\":[\"https:\\\/\\\/cybersecthreat.com\"],\"knowsAbout\":[\"CyberSecurity\"],\"knowsLanguage\":[\"English\",\"Chinese\"],\"jobTitle\":\"Founder, CEO\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/zh\\\/author\\\/kelvinyip-m\\\/\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#local-main-place-address\",\"streetAddress\":\"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)\",\"addressLocality\":\"New Taipei City\",\"postalCode\":\"242032\",\"addressRegion\":\"Taiwan\",\"addressCountry\":\"TW\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2020\\\/07\\\/28\\\/extract-password-from-exe-part1\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"width\":164,\"height\":164,\"caption\":\"CyberSecThreat Corporation Limited.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"New Taipei City\" \/>\n<meta name=\"geo.position\" content=\"25.0600452;121.4594381\" \/>\n<meta name=\"geo.region\" content=\"Taiwan\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Extract password from exe(1) - CyberSecThreat","description":"Extract password from exe is one of the technique that we may use during our red team engagement. ... script-to-executable ... py2exe, PyInstaller and AutoIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersecthreat.com\/zh\/2020\/07\/28\/extract-password-from-exe-part1\/","og_locale":"zh_TW","og_type":"article","og_title":"Extract password from exe(1)","og_description":"Extract password from exe - Part 1 Extract password from exe is one of the techniques that we may use during our red team engagement. Actually, there are","og_url":"https:\/\/cybersecthreat.com\/zh\/2020\/07\/28\/extract-password-from-exe-part1\/","og_site_name":"CyberSecThreat","article_publisher":"https:\/\/www.facebook.com\/cybersecthreat","article_published_time":"2020-07-28T17:53:48+00:00","article_modified_time":"2024-04-01T05:51:05+00:00","og_image":[{"width":572,"height":522,"url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png","type":"image\/png"}],"author":"Kelvin Yip","twitter_card":"summary_large_image","twitter_creator":"@cybersecthreat","twitter_site":"@cybersecthreat","twitter_misc":{"\u4f5c\u8005:":"Kelvin Yip","\u9810\u4f30\u95b1\u8b80\u6642\u9593":"10 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#article","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/"},"author":{"name":"Kelvin Yip","@id":"https:\/\/cybersecthreat.com\/#\/schema\/person\/4787dde06da74fa66cb5e92e481b0f98"},"headline":"Extract password from exe(1)","datePublished":"2020-07-28T17:53:48+00:00","dateModified":"2024-04-01T05:51:05+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/"},"wordCount":1310,"commentCount":0,"publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"image":{"@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png","keywords":["AutoIt","Blue Team","decompile","py2exe","pyinstaller","Python","Red Team","Reverse Engineering"],"articleSection":["Blue Team","Red Team","Reverse Engineering"],"inLanguage":"zh-TW","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/","url":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/","name":"Extract password from exe(1) - CyberSecThreat","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#primaryimage"},"image":{"@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png","datePublished":"2020-07-28T17:53:48+00:00","dateModified":"2024-04-01T05:51:05+00:00","description":"Extract password from exe is one of the technique that we may use during our red team engagement. ... script-to-executable ... py2exe, PyInstaller and AutoIT","breadcrumb":{"@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#primaryimage","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png","width":572,"height":522,"caption":"autoit exe2aut success extract password from exe after resource hacker"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Red Team","item":"https:\/\/cybersecthreat.com\/category\/red-team\/"},{"@type":"ListItem","position":2,"name":"Extract password from exe(1)"}]},{"@type":"WebSite","@id":"https:\/\/cybersecthreat.com\/#website","url":"https:\/\/cybersecthreat.com\/","name":"\u5947\u8cc7\u5b89","description":"\u7db2\u8def\u5b89\u5168\u65b9\u6848","publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersecthreat.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":["Organization","Place"],"@id":"https:\/\/cybersecthreat.com\/#organization","name":"\u5947\u8cc7\u8a0a\u4fdd\u5b89\u53ca\u7db2\u7d61\u6709\u9650\u516c\u53f8","alternateName":"CyberSecThreat","url":"https:\/\/cybersecthreat.com\/","logo":{"@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#local-main-organization-logo"},"image":{"@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/cybersecthreat","https:\/\/x.com\/cybersecthreat","https:\/\/www.linkedin.com\/company\/cybersecthreat-corporation-limited"],"description":"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.","legalName":"CyberSecThreat Corporation Limited.","foundingDate":"2021-01-23","address":{"@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"25.0600452","longitude":"121.4594381"},"telephone":["(+886) 02 - 77527628"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"18:00"}],"email":"info@cybersecthreat.com","areaServed":"Taiwan"},{"@type":"Person","@id":"https:\/\/cybersecthreat.com\/#\/schema\/person\/4787dde06da74fa66cb5e92e481b0f98","name":"Kelvin Yip","image":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/secure.gravatar.com\/avatar\/91aef1abe820d485df4dc03c80c4bab5b129b723fea7002f20904634c1042d21?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/91aef1abe820d485df4dc03c80c4bab5b129b723fea7002f20904634c1042d21?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/91aef1abe820d485df4dc03c80c4bab5b129b723fea7002f20904634c1042d21?s=96&d=mm&r=g","caption":"Kelvin Yip"},"sameAs":["https:\/\/cybersecthreat.com"],"knowsAbout":["CyberSecurity"],"knowsLanguage":["English","Chinese"],"jobTitle":"Founder, CEO","url":"https:\/\/cybersecthreat.com\/zh\/author\/kelvinyip-m\/"},{"@type":"PostalAddress","@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#local-main-place-address","streetAddress":"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)","addressLocality":"New Taipei City","postalCode":"242032","addressRegion":"Taiwan","addressCountry":"TW"},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/2020\/07\/28\/extract-password-from-exe-part1\/#local-main-organization-logo","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","width":164,"height":164,"caption":"CyberSecThreat Corporation Limited."}]},"geo.placename":"New Taipei City","geo.position":{"lat":"25.0600452","long":"121.4594381"},"geo.region":"Taiwan"},"taxonomy_info":{"category":[{"value":42,"label":"Blue Team"},{"value":40,"label":"Red Team"},{"value":57,"label":"Reverse Engineering"}],"post_tag":[{"value":62,"label":"AutoIt"},{"value":21,"label":"Blue Team"},{"value":63,"label":"decompile"},{"value":61,"label":"py2exe"},{"value":58,"label":"pyinstaller"},{"value":59,"label":"Python"},{"value":17,"label":"Red Team"},{"value":60,"label":"Reverse Engineering"}]},"featured_image_src_large":["https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/autoit_exe2aut_success_extract_password_from_exe_after_resource_hacker.png",572,522,false],"author_info":{"display_name":"Kelvin Yip","author_link":"https:\/\/cybersecthreat.com\/zh\/author\/kelvinyip-m\/"},"comment_info":1,"category_info":[{"term_id":42,"name":"Blue Team","slug":"blue-team","term_group":0,"term_taxonomy_id":42,"taxonomy":"category","description":"","parent":0,"count":14,"filter":"raw","cat_ID":42,"category_count":14,"category_description":"","cat_name":"Blue Team","category_nicename":"blue-team","category_parent":0},{"term_id":40,"name":"Red Team","slug":"red-team","term_group":0,"term_taxonomy_id":40,"taxonomy":"category","description":"","parent":0,"count":6,"filter":"raw","cat_ID":40,"category_count":6,"category_description":"","cat_name":"Red Team","category_nicename":"red-team","category_parent":0},{"term_id":57,"name":"Reverse Engineering","slug":"reverse-engineering","term_group":0,"term_taxonomy_id":57,"taxonomy":"category","description":"","parent":0,"count":3,"filter":"raw","cat_ID":57,"category_count":3,"category_description":"","cat_name":"Reverse Engineering","category_nicename":"reverse-engineering","category_parent":0}],"tag_info":[{"term_id":62,"name":"AutoIt","slug":"autoit","term_group":0,"term_taxonomy_id":62,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":21,"name":"Blue Team","slug":"blue-team","term_group":0,"term_taxonomy_id":21,"taxonomy":"post_tag","description":"","parent":0,"count":13,"filter":"raw"},{"term_id":63,"name":"decompile","slug":"decompile","term_group":0,"term_taxonomy_id":63,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":61,"name":"py2exe","slug":"py2exe","term_group":0,"term_taxonomy_id":61,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":58,"name":"pyinstaller","slug":"pyinstaller","term_group":0,"term_taxonomy_id":58,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":59,"name":"Python","slug":"python","term_group":0,"term_taxonomy_id":59,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":17,"name":"Red Team","slug":"red-team","term_group":0,"term_taxonomy_id":17,"taxonomy":"post_tag","description":"","parent":0,"count":6,"filter":"raw"},{"term_id":60,"name":"Reverse Engineering","slug":"reverse-engineering","term_group":0,"term_taxonomy_id":60,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts\/598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/comments?post=598"}],"version-history":[{"count":0,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts\/598\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media\/717"}],"wp:attachment":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media?parent=598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/categories?post=598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/tags?post=598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}