{"uuid": "ff62ae56-7d37-4172-bd79-69adb6d452ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-18988", "type": "exploited", "source": "https://t.me/information_security_channel/35219", "content": "DecryptTeamViewer : Enumerate &amp; Decrypt TeamViewer Credentials From Windows Registry\nhttps://kalilinuxtutorials.com/decryptteamviewer/\n\nDecryptTeamViewer uses CVE-2019-18988 to enumerate and decrypt TeamViewer credentials from Windows registry. Blogpost detailing the vulnerability by clicking here. See below for an implementation in Python as well as further below for a post metasploit module; import sys, hexdump, binasciifrom Crypto.Cipher import AES class AESCipher: def init(self, key): self.key = key def decrypt(self, iv, data): [\u2026]\nThe post DecryptTeamViewer : Enumerate &amp; Decrypt TeamViewer Credentials From Windows Registry (https://kalilinuxtutorials.com/decryptteamviewer/) appeared first on Kali Linux Tutorials (https://kalilinuxtutorials.com/).", "creation_timestamp": "2020-02-21T03:55:25.000000Z"}