Home

Awesome

OpenVPN credentials extractor

This repository contains a plugin for Volatility that can extract credentials from the memory of an OpenVPN process. The username and password entered by the user, as well as passwords entered to unlock a private key can be recovered. OpenVPN's --auth-nocache flag must not be set. The plugin supports OpenVPN 2.X.X on Windows. It was successfully tested with OpenVPN 2.2.2, 2.3.2 and 2.3.4 on Windows XP (x86) and Windows 7 (x86 & x64).

This repository also contains a small plugin to extract base64/PEM encoded RSA private keys from memory.

Motivation

This plugin was developed as a part of a university assignment about virtual machine introspection. The Volatility framework was chosen, because it offers a wide variety of plugins and can interface with hypervisors through libvmi to perform introspection. OpenVPN was chosen as a target, because it is widely deployed at the university to facilitate network access control. This allowed to evaluate the security of the OpenVPN deployment and demonstrate the plugin on an application that students are familiar with in everyday use.

In a real-world scenario, the plugin may be handy to extract credentials during an investigation or pentest engagement. You can also use it to validate that OpenVPN's --auth-nocache flag works as intended.

Installation

Either place the plugins into Volatility's plugins/ directory, or use the --plugins= option to point Volatility to the directory containing openvpn.py.

Usage

The plugins expect no further arguments, just load a memory image and specify a profile for Volatility. A memory sample can be downloaded from https://mega.co.nz/#!Wx5kiZZS!77NiMTl8B_imwhl4JSg0lmRm90LZ9wgvFhQYxmmOioo. After downloading the memory dump, decompress it and run Volatility to extract the credentials:

unxz "OpenVPN-2.3.4 XP 32.elf.xz"
volatility -f "OpenVPN-2.3.4 XP 32.elf" --profile=WinXPSP3x86 openvpn