Files
HackBrowserData/utils/chainbreaker/chainbreaker_test.go
T
zznQ f2b0e4bf47 feat: Decrypt the browser master key on macOS via CVE-2025-24204 (#494)
* feat: Decrypt the browser master key on macOS via CVE-2025-24204

* fix: resolve lint warnings and stabilize tests

* feat: default to gcoredump key extraction on macOS
2025-11-27 17:13:07 +08:00

31 lines
800 B
Go

package chainbreaker
import (
"testing"
)
func TestUnlockKeychain(t *testing.T) {
keychain, err := New("./testdata/test.keychain-db", "6d43376c0d257bbaca2c41eded65b3b34a1a96bd19979bde")
if err != nil {
t.Fatalf("Failed to unlock keychain: %v", err)
}
records, err := keychain.DumpGenericPasswords()
if err != nil {
t.Fatal(err)
}
for _, rec := range records {
t.Log("[+] Generic Password Record")
t.Logf(" [-] Service: %s\n", rec.Service)
t.Logf(" [-] Account: %s\n", rec.Account)
t.Logf(" [-] Description: %s\n", rec.Description)
t.Logf(" [-] Created: %s\n", rec.Created)
t.Logf(" [-] Last Modified: %s\n", rec.LastModified)
if rec.PasswordBase64 {
t.Logf(" [-] Base64 Password: %s\n", rec.Password)
} else {
t.Logf(" [-] Password: %s\n", rec.Password)
}
}
}