mirror of
https://github.com/moonD4rk/HackBrowserData
synced 2025-04-22 06:55:38 +00:00
dev-feat: format old code
This commit is contained in:
parent
c8717e3009
commit
f9904277fd
@ -5,7 +5,7 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"hack-browser-data/core"
|
"hack-browser-data/core"
|
||||||
"hack-browser-data/log"
|
"hack-browser-data/pkg/log"
|
||||||
"hack-browser-data/utils"
|
"hack-browser-data/utils"
|
||||||
|
|
||||||
"github.com/urfave/cli/v2"
|
"github.com/urfave/cli/v2"
|
||||||
|
1
cmd/hackbrowserdata/main.go
Normal file
1
cmd/hackbrowserdata/main.go
Normal file
@ -0,0 +1 @@
|
|||||||
|
package hackbrowserdata
|
@ -8,7 +8,7 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"hack-browser-data/core/data"
|
"hack-browser-data/core/data"
|
||||||
"hack-browser-data/log"
|
"hack-browser-data/pkg/log"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -3,11 +3,11 @@ package core
|
|||||||
import (
|
import (
|
||||||
"crypto/sha1"
|
"crypto/sha1"
|
||||||
|
|
||||||
"hack-browser-data/log"
|
|
||||||
|
|
||||||
"github.com/godbus/dbus/v5"
|
"github.com/godbus/dbus/v5"
|
||||||
keyring "github.com/ppacher/go-dbus-keyring"
|
keyring "github.com/ppacher/go-dbus-keyring"
|
||||||
"golang.org/x/crypto/pbkdf2"
|
"golang.org/x/crypto/pbkdf2"
|
||||||
|
|
||||||
|
"hack-browser-data/pkg/log"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -12,7 +12,7 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"hack-browser-data/core/decrypt"
|
"hack-browser-data/core/decrypt"
|
||||||
"hack-browser-data/log"
|
"hack-browser-data/pkg/log"
|
||||||
"hack-browser-data/utils"
|
"hack-browser-data/utils"
|
||||||
|
|
||||||
_ "github.com/mattn/go-sqlite3"
|
_ "github.com/mattn/go-sqlite3"
|
||||||
@ -657,14 +657,14 @@ func (p *passwords) FirefoxParse() error {
|
|||||||
keyLin := []byte{248, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}
|
keyLin := []byte{248, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}
|
||||||
metaPBE, err := decrypt.NewASN1PBE(metaBytes)
|
metaPBE, err := decrypt.NewASN1PBE(metaBytes)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error("decrypt meta data failed", err)
|
log.Error("decrypter meta data failed", err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
// default master password is empty
|
// default master password is empty
|
||||||
var masterPwd []byte
|
var masterPwd []byte
|
||||||
k, err := metaPBE.Decrypt(globalSalt, masterPwd)
|
k, err := metaPBE.Decrypt(globalSalt, masterPwd)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error("decrypt firefox meta bytes failed", err)
|
log.Error("decrypter firefox meta bytes failed", err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if bytes.Contains(k, []byte("password-check")) {
|
if bytes.Contains(k, []byte("password-check")) {
|
||||||
@ -703,7 +703,7 @@ func (p *passwords) FirefoxParse() error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error(err)
|
log.Error(err)
|
||||||
}
|
}
|
||||||
log.Debug("decrypt firefox success")
|
log.Debug("decrypter firefox success")
|
||||||
p.logins = append(p.logins, loginData{
|
p.logins = append(p.logins, loginData{
|
||||||
LoginUrl: v.LoginUrl,
|
LoginUrl: v.LoginUrl,
|
||||||
UserName: string(decrypt.PKCS5UnPadding(user)),
|
UserName: string(decrypt.PKCS5UnPadding(user)),
|
||||||
|
@ -16,7 +16,7 @@ import (
|
|||||||
var (
|
var (
|
||||||
errSecurityKeyIsEmpty = errors.New("input [security find-generic-password -wa 'Chrome'] in terminal")
|
errSecurityKeyIsEmpty = errors.New("input [security find-generic-password -wa 'Chrome'] in terminal")
|
||||||
errPasswordIsEmpty = errors.New("password is empty")
|
errPasswordIsEmpty = errors.New("password is empty")
|
||||||
errDecryptFailed = errors.New("decrypt encrypt value failed")
|
errDecryptFailed = errors.New("decrypter encrypt value failed")
|
||||||
errDecodeASN1Failed = errors.New("decode ASN1 data failed")
|
errDecodeASN1Failed = errors.New("decode ASN1 data failed")
|
||||||
errEncryptedLength = errors.New("length of encrypted password less than block size")
|
errEncryptedLength = errors.New("length of encrypted password less than block size")
|
||||||
)
|
)
|
||||||
@ -189,7 +189,7 @@ func PKCS5UnPadding(src []byte) []byte {
|
|||||||
return src[:(length - unpad)]
|
return src[:(length - unpad)]
|
||||||
}
|
}
|
||||||
|
|
||||||
// des3Decrypt use for decrypt firefox PBE
|
// des3Decrypt use for decrypter firefox PBE
|
||||||
func des3Decrypt(key, iv []byte, src []byte) ([]byte, error) {
|
func des3Decrypt(key, iv []byte, src []byte) ([]byte, error) {
|
||||||
block, err := des.NewTripleDESCipher(key)
|
block, err := des.NewTripleDESCipher(key)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
Loading…
Reference in New Issue
Block a user