If you are like me and have maintained a copy of Core FTP LE simply because there is no easy way to extract passwords from the application, follow these instructions to set yourself free.
No download or payment required
A lot of the solutions available cost money or require you to install software. This is no longer necessary, and you can thank me in a moment.
Instructions
Find the encrypted passwords in the Windows Registry
- Open the Registry Editor
- Windows 10: Press the Windows key, type
regedit
, and press enter - Older Windows: Go to Start, Run, type
regedit
, and press enter
- Windows 10: Press the Windows key, type
- Find the numbered site profiles saved in
HKEY_CURRENT_USER\SOFTWARE\FTPWare\CoreFTP\Sites
. Each site holds the label with which you are familiar in the key calledName
. - Copy the encrypted password that is saved in a key called
PW
.
Decrypt the password using a web page
- Go to http://aes.online-domain-tools.com/
- Choose these settings
- Input type: text
- Input text: [the encrypted password you found in the registry]
- Plaintext or Hex: Hex
- Function: AES
- Mode: ECB
- Key: hdfzpysvpzimorhk
- Plaintext or Hex: Plaintext
- Press the decrypt button
You will see output that looks like this:
38 30 38 36 37 37 37 31 37 30 00 00 00 00 00 00 8 0 8 6 7 7 7 1 7 0 . . . . . .
The password in this sample output is 8086777170. Wash, rinse, and repeat for all the site profiles you find in the registry. Profiles that have no saved password will have no content in the PW
key.
If this saved your life, consider buying me a beer. My Paypal is [email protected].
When I stopped using CoreFTP, I moved on to FileZilla. I needed an FTP client that worked on both macOS and Windows to make life easy.
Comments
27 responses to “How to extract passwords from Core FTP LE”
damn it man! You just save my a****!!! thank you 10x!!!!!
No problem, glad I could help!
Thanks a lot man. It works perfectly
The other way to find encrypted password: Site Manager -> Export, then find PW for site in the exported configuration file
You the man. Worked like a charm.
A_MA_ZING! Thanks !!!
Thank you – it’s worked ;o)
Perfect , thanks
That worked. How did you determined what key to use? Regarding Step 6 in decryption process.
I found it on another site that doesn’t show up in search engines as well as this page does.
thank you very much :)
our IT guy left and I didn’t know the password and had to put the same FTP software onto another PC.
cheers,
T
Thanks, worked perfectly. Much appreciated!
Brilliant. Found my blammed CoreFTP password at last.
From the linux command line:
PW=123
echo -n $PW | xxd -p -r | openssl enc -aes-128-ecb -d -nopad -K $(echo -n “hdfzpysvpzimorhk” | od -A n -t x1 | tr -d ‘ \n’)
THX A LOT after few monts i decode password to my VM which i forgot and i have thios password encrypted in CoreFTP:D :D :D
Thank You. Thank You. Thank You. Just like you, I got the Core FTP sitting there without knowing the password. It’s now added to my master.
Thank you and Awesome!
Thank you!!! My predecessor at work never documented this information. A huge help.
It simply works!
The one password I didn’t try! :) Thanks!
Thanks !!! Worked perfectly !!!
That helped!! Thanks so much!!
This is awesome. Thanks!
si funciona!!
Life saver. Had to get ftp program moved ASAP to start doing daily COVID vaccination record uploads and old admin didn’t leave the password.
Thanks for saving me a lot of time
Thank you for posting these instructions. I was going to reboot the switches and recover the passwords, you just saved me tons of work..