axiom41

Members
  • Content count

    16
  • Joined

  • Last visited

Community Reputation

3 Neutral

About axiom41

  • Rank
    Freshman

Profile Information

  • Gender Female
  1. Hey there. It's not that hard to extract data in a more readable way. First, save the HTML page source in a new file, and name it the way you want, e.g, mypasskeeper.html Then open this new file with a text editor (i like Notepad++, but it's your own choice) and make a massive replacement of all the strings <input type="password" class="originpwd" name="password" readonly value=" (they are the strings preceding each password value; be sure to include the last double quotes) with nothing. Save the file after the replacement above and open it with Excel: you will see a block of cells with headers like "Title", "Account", "Password", "URL" and "Delete", the same in the Passkeeper table, followed by rows with your sites, userIds and passwords. Be careful that in each password there will be 2 more characters at the end, i.e. ">, that have to be removed to get the actual password Finally, remove from the top and the bottom, all rows other than those related to your password table and re-save the "cleaned" html file. Quick & dirty...
  2. Without an export option in Passkeeper, i found a simple workaround to retrieve and save all passwords stored for your Maxthon account. A minimum HTML knowledge is necessary to understand displayed information, and instructions to offline processing of retrieved information is not provided. Be very careful, since saving passwords on a plain file is not safe!!! From http://www.maxthon.com website, click on "My U+" menu on top, or directly go to https://www.uu.me Login with your Maxthon account. You should be now in your "Maxthon U+" web page: click on "Passkeeper" on top menu (password will be asked again). You will now see a web page with the list of all your accounts and passwords (don't worry if they look "masked" by dots). This is NOT the Passkeeper tool embedded in Maxthon browser, but an ordinary/plain/unprotected web page with the same data. With your browser, now right-click anywhere in the page and select "View page source" or anything similar, depending on the browser (this can be copied/pasted in a text editor or saved as plain HTML file for your own purposes, including offline processing in a more readable way, e.g. in an Excel file). The HTML code is then shown, and there you can search for a line with this tag: <table class="table table-mmds table-sort table-sort-search table-sort-show-search-count"> This is the beginning of the entire list of your accounts & password: for each list entry, you can easily see 4 "blocks of code": a. the <td> tag for the table cell with the name of the site and the link to show details ('<a href="fav.html?m=see&unid=...') b. the <td> tag for the table cell containing the Account name for the site ('<td class="caname search-item">...') c. the <td> tag for the table cell containing the password for the account ('<td class="pwd-item capassword"><input type="password" class="originpwd" name="password" readonly value="PASSWORD">...') [yes!!! That is your password for the site, fully readable!!!] d. the <td> tag for the table cell with the web address of the site ('<td class="orgin-item search-item caurl"><span>...') Check it out!!! Just concerned about Maxthon security, if an unprotected web page can be generated and saved in such an easy way...