123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997 |
- #!/usr/bin/env python
- """
- Copyright (c) 2006-2017 sqlmap developers (http://sqlmap.org/)
- See the file 'doc/COPYING' for copying permission
- """
- try:
- from crypt import crypt
- except ImportError:
- from thirdparty.fcrypt.fcrypt import crypt
- _multiprocessing = None
- try:
- import multiprocessing
- # problems on FreeBSD (Reference: http://www.eggheadcafe.com/microsoft/Python/35880259/multiprocessing-on-freebsd.aspx)
- _ = multiprocessing.Queue()
- except (ImportError, OSError):
- pass
- else:
- try:
- if multiprocessing.cpu_count() > 1:
- _multiprocessing = multiprocessing
- except NotImplementedError:
- pass
- import gc
- import os
- import re
- import tempfile
- import time
- import zipfile
- from hashlib import md5
- from hashlib import sha1
- from hashlib import sha224
- from hashlib import sha384
- from hashlib import sha512
- from Queue import Queue
- from lib.core.common import Backend
- from lib.core.common import checkFile
- from lib.core.common import clearConsoleLine
- from lib.core.common import dataToStdout
- from lib.core.common import getFileItems
- from lib.core.common import getPublicTypeMembers
- from lib.core.common import getSafeExString
- from lib.core.common import getUnicode
- from lib.core.common import hashDBRetrieve
- from lib.core.common import hashDBWrite
- from lib.core.common import normalizeUnicode
- from lib.core.common import paths
- from lib.core.common import readInput
- from lib.core.common import singleTimeLogMessage
- from lib.core.common import singleTimeWarnMessage
- from lib.core.convert import hexdecode
- from lib.core.convert import hexencode
- from lib.core.convert import utf8encode
- from lib.core.data import conf
- from lib.core.data import kb
- from lib.core.data import logger
- from lib.core.enums import DBMS
- from lib.core.enums import HASH
- from lib.core.enums import MKSTEMP_PREFIX
- from lib.core.exception import SqlmapDataException
- from lib.core.exception import SqlmapUserQuitException
- from lib.core.settings import COMMON_PASSWORD_SUFFIXES
- from lib.core.settings import COMMON_USER_COLUMNS
- from lib.core.settings import DUMMY_USER_PREFIX
- from lib.core.settings import HASH_MOD_ITEM_DISPLAY
- from lib.core.settings import HASH_RECOGNITION_QUIT_THRESHOLD
- from lib.core.settings import IS_WIN
- from lib.core.settings import ITOA64
- from lib.core.settings import NULL
- from lib.core.settings import UNICODE_ENCODING
- from lib.core.settings import ROTATING_CHARS
- from lib.core.wordlist import Wordlist
- from thirdparty.colorama.initialise import init as coloramainit
- from thirdparty.pydes.pyDes import des
- from thirdparty.pydes.pyDes import CBC
- def mysql_passwd(password, uppercase=True):
- """
- Reference(s):
- http://csl.sublevel3.org/mysql-password-function/
- >>> mysql_passwd(password='testpass', uppercase=True)
- '*00E247AC5F9AF26AE0194B41E1E769DEE1429A29'
- """
- retVal = "*%s" % sha1(sha1(password).digest()).hexdigest()
- return retVal.upper() if uppercase else retVal.lower()
- def mysql_old_passwd(password, uppercase=True): # prior to version '4.1'
- """
- Reference(s):
- http://www.sfr-fresh.com/unix/privat/tpop3d-1.5.5.tar.gz:a/tpop3d-1.5.5/password.c
- http://voidnetwork.org/5ynL0rd/darkc0de/python_script/darkMySQLi.html
- >>> mysql_old_passwd(password='testpass', uppercase=True)
- '7DCDA0D57290B453'
- """
- a, b, c = 1345345333, 7, 0x12345671
- for d in password:
- if d == ' ' or d == '\t':
- continue
- e = ord(d)
- a ^= (((a & 63) + b) * e) + (a << 8)
- c += (c << 8) ^ a
- b += e
- retVal = "%08lx%08lx" % (a & ((1 << 31) - 1), c & ((1 << 31) - 1))
- return retVal.upper() if uppercase else retVal.lower()
- def postgres_passwd(password, username, uppercase=False):
- """
- Reference(s):
- http://pentestmonkey.net/blog/cracking-postgres-hashes/
- >>> postgres_passwd(password='testpass', username='testuser', uppercase=False)
- 'md599e5ea7a6f7c3269995cba3927fd0093'
- """
- if isinstance(username, unicode):
- username = unicode.encode(username, UNICODE_ENCODING)
- if isinstance(password, unicode):
- password = unicode.encode(password, UNICODE_ENCODING)
- retVal = "md5%s" % md5(password + username).hexdigest()
- return retVal.upper() if uppercase else retVal.lower()
- def mssql_passwd(password, salt, uppercase=False):
- """
- Reference(s):
- http://www.leidecker.info/projects/phrasendrescher/mssql.c
- https://www.evilfingers.com/tools/GSAuditor.php
- >>> mssql_passwd(password='testpass', salt='4086ceb6', uppercase=False)
- '0x01004086ceb60c90646a8ab9889fe3ed8e5c150b5460ece8425a'
- """
- binsalt = hexdecode(salt)
- unistr = "".join(map(lambda c: ("%s\0" if ord(c) < 256 else "%s") % utf8encode(c), password))
- retVal = "0100%s%s" % (salt, sha1(unistr + binsalt).hexdigest())
- return "0x%s" % (retVal.upper() if uppercase else retVal.lower())
- def mssql_old_passwd(password, salt, uppercase=True): # prior to version '2005'
- """
- Reference(s):
- www.exploit-db.com/download_pdf/15537/
- http://www.leidecker.info/projects/phrasendrescher/mssql.c
- https://www.evilfingers.com/tools/GSAuditor.php
- >>> mssql_old_passwd(password='testpass', salt='4086ceb6', uppercase=True)
- '0x01004086CEB60C90646A8AB9889FE3ED8E5C150B5460ECE8425AC7BB7255C0C81D79AA5D0E93D4BB077FB9A51DA0'
- """
- binsalt = hexdecode(salt)
- unistr = "".join(map(lambda c: ("%s\0" if ord(c) < 256 else "%s") % utf8encode(c), password))
- retVal = "0100%s%s%s" % (salt, sha1(unistr + binsalt).hexdigest(), sha1(unistr.upper() + binsalt).hexdigest())
- return "0x%s" % (retVal.upper() if uppercase else retVal.lower())
- def mssql_new_passwd(password, salt, uppercase=False):
- """
- Reference(s):
- http://hashcat.net/forum/thread-1474.html
- >>> mssql_new_passwd(password='testpass', salt='4086ceb6', uppercase=False)
- '0x02004086ceb6eb051cdbc5bdae68ffc66c918d4977e592f6bdfc2b444a7214f71fa31c35902c5b7ae773ed5f4c50676d329120ace32ee6bc81c24f70711eb0fc6400e85ebf25'
- """
- binsalt = hexdecode(salt)
- unistr = "".join(map(lambda c: ("%s\0" if ord(c) < 256 else "%s") % utf8encode(c), password))
- retVal = "0200%s%s" % (salt, sha512(unistr + binsalt).hexdigest())
- return "0x%s" % (retVal.upper() if uppercase else retVal.lower())
- def oracle_passwd(password, salt, uppercase=True):
- """
- Reference(s):
- https://www.evilfingers.com/tools/GSAuditor.php
- http://www.notesbit.com/index.php/scripts-oracle/oracle-11g-new-password-algorithm-is-revealed-by-seclistsorg/
- http://seclists.org/bugtraq/2007/Sep/304
- >>> oracle_passwd(password='SHAlala', salt='1B7B5F82B7235E9E182C', uppercase=True)
- 'S:2BFCFDF5895014EE9BB2B9BA067B01E0389BB5711B7B5F82B7235E9E182C'
- """
- binsalt = hexdecode(salt)
- retVal = "s:%s%s" % (sha1(utf8encode(password) + binsalt).hexdigest(), salt)
- return retVal.upper() if uppercase else retVal.lower()
- def oracle_old_passwd(password, username, uppercase=True): # prior to version '11g'
- """
- Reference(s):
- http://www.notesbit.com/index.php/scripts-oracle/oracle-11g-new-password-algorithm-is-revealed-by-seclistsorg/
- >>> oracle_old_passwd(password='tiger', username='scott', uppercase=True)
- 'F894844C34402B67'
- """
- IV, pad = "\0" * 8, "\0"
- if isinstance(username, unicode):
- username = unicode.encode(username, UNICODE_ENCODING)
- if isinstance(password, unicode):
- password = unicode.encode(password, UNICODE_ENCODING)
- unistr = "".join("\0%s" % c for c in (username + password).upper())
- cipher = des(hexdecode("0123456789ABCDEF"), CBC, IV, pad)
- encrypted = cipher.encrypt(unistr)
- cipher = des(encrypted[-8:], CBC, IV, pad)
- encrypted = cipher.encrypt(unistr)
- retVal = hexencode(encrypted[-8:])
- return retVal.upper() if uppercase else retVal.lower()
- def md5_generic_passwd(password, uppercase=False):
- """
- >>> md5_generic_passwd(password='testpass', uppercase=False)
- '179ad45c6ce2cb97cf1029e212046e81'
- """
- retVal = md5(password).hexdigest()
- return retVal.upper() if uppercase else retVal.lower()
- def sha1_generic_passwd(password, uppercase=False):
- """
- >>> sha1_generic_passwd(password='testpass', uppercase=False)
- '206c80413b9a96c1312cc346b7d2517b84463edd'
- """
- retVal = sha1(password).hexdigest()
- return retVal.upper() if uppercase else retVal.lower()
- def sha224_generic_passwd(password, uppercase=False):
- """
- >>> sha224_generic_passwd(password='testpass', uppercase=False)
- '648db6019764b598f75ab6b7616d2e82563a00eb1531680e19ac4c6f'
- """
- retVal = sha224(password).hexdigest()
- return retVal.upper() if uppercase else retVal.lower()
- def sha384_generic_passwd(password, uppercase=False):
- """
- >>> sha384_generic_passwd(password='testpass', uppercase=False)
- '6823546e56adf46849343be991d4b1be9b432e42ed1b4bb90635a0e4b930e49b9ca007bc3e04bf0a4e0df6f1f82769bf'
- """
- retVal = sha384(password).hexdigest()
- return retVal.upper() if uppercase else retVal.lower()
- def sha512_generic_passwd(password, uppercase=False):
- """
- >>> sha512_generic_passwd(password='testpass', uppercase=False)
- '78ddc8555bb1677ff5af75ba5fc02cb30bb592b0610277ae15055e189b77fe3fda496e5027a3d99ec85d54941adee1cc174b50438fdc21d82d0a79f85b58cf44'
- """
- retVal = sha512(password).hexdigest()
- return retVal.upper() if uppercase else retVal.lower()
- def crypt_generic_passwd(password, salt, uppercase=False):
- """
- Reference(s):
- http://docs.python.org/library/crypt.html
- http://helpful.knobs-dials.com/index.php/Hashing_notes
- http://php.net/manual/en/function.crypt.php
- http://carey.geek.nz/code/python-fcrypt/
- >>> crypt_generic_passwd(password='rasmuslerdorf', salt='rl', uppercase=False)
- 'rl.3StKT.4T8M'
- """
- retVal = crypt(password, salt)
- return retVal.upper() if uppercase else retVal
- def wordpress_passwd(password, salt, count, prefix, uppercase=False):
- """
- Reference(s):
- http://packetstormsecurity.org/files/74448/phpassbrute.py.txt
- http://scriptserver.mainframe8.com/wordpress_password_hasher.php
- >>> wordpress_passwd(password='testpass', salt='aD9ZLmkp', count=2048, prefix='$P$9aD9ZLmkp', uppercase=False)
- '$P$9aD9ZLmkpsN4A83G8MefaaP888gVKX0'
- """
- def _encode64(input_, count):
- output = ''
- i = 0
- while i < count:
- value = ord(input_[i])
- i += 1
- output = output + ITOA64[value & 0x3f]
- if i < count:
- value = value | (ord(input_[i]) << 8)
- output = output + ITOA64[(value >> 6) & 0x3f]
- i += 1
- if i >= count:
- break
- if i < count:
- value = value | (ord(input_[i]) << 16)
- output = output + ITOA64[(value >> 12) & 0x3f]
- i += 1
- if i >= count:
- break
- output = output + ITOA64[(value >> 18) & 0x3f]
- return output
- if isinstance(password, unicode):
- password = password.encode(UNICODE_ENCODING)
- cipher = md5(salt)
- cipher.update(password)
- hash_ = cipher.digest()
- for i in xrange(count):
- _ = md5(hash_)
- _.update(password)
- hash_ = _.digest()
- retVal = prefix + _encode64(hash_, 16)
- return retVal.upper() if uppercase else retVal
- __functions__ = {
- HASH.MYSQL: mysql_passwd,
- HASH.MYSQL_OLD: mysql_old_passwd,
- HASH.POSTGRES: postgres_passwd,
- HASH.MSSQL: mssql_passwd,
- HASH.MSSQL_OLD: mssql_old_passwd,
- HASH.MSSQL_NEW: mssql_new_passwd,
- HASH.ORACLE: oracle_passwd,
- HASH.ORACLE_OLD: oracle_old_passwd,
- HASH.MD5_GENERIC: md5_generic_passwd,
- HASH.SHA1_GENERIC: sha1_generic_passwd,
- HASH.SHA224_GENERIC: sha224_generic_passwd,
- HASH.SHA384_GENERIC: sha384_generic_passwd,
- HASH.SHA512_GENERIC: sha512_generic_passwd,
- HASH.CRYPT_GENERIC: crypt_generic_passwd,
- HASH.WORDPRESS: wordpress_passwd,
- }
- def storeHashesToFile(attack_dict):
- if not attack_dict:
- return
- if kb.storeHashesChoice is None:
- message = "do you want to store hashes to a temporary file "
- message += "for eventual further processing with other tools [y/N] "
- test = readInput(message, default="N")
- kb.storeHashesChoice = test[0] in ("y", "Y")
- if not kb.storeHashesChoice:
- return
- handle, filename = tempfile.mkstemp(prefix=MKSTEMP_PREFIX.HASHES, suffix=".txt")
- os.close(handle)
- infoMsg = "writing hashes to a temporary file '%s' " % filename
- logger.info(infoMsg)
- items = set()
- with open(filename, "w+") as f:
- for user, hashes in attack_dict.items():
- for hash_ in hashes:
- hash_ = hash_.split()[0] if hash_ and hash_.strip() else hash_
- if hash_ and hash_ != NULL and hashRecognition(hash_):
- item = None
- if user and not user.startswith(DUMMY_USER_PREFIX):
- item = "%s:%s\n" % (user.encode(UNICODE_ENCODING), hash_.encode(UNICODE_ENCODING))
- else:
- item = "%s\n" % hash_.encode(UNICODE_ENCODING)
- if item and item not in items:
- f.write(item)
- items.add(item)
- def attackCachedUsersPasswords():
- if kb.data.cachedUsersPasswords:
- results = dictionaryAttack(kb.data.cachedUsersPasswords)
- lut = {}
- for (_, hash_, password) in results:
- lut[hash_.lower()] = password
- for user in kb.data.cachedUsersPasswords.keys():
- for i in xrange(len(kb.data.cachedUsersPasswords[user])):
- if (kb.data.cachedUsersPasswords[user][i] or "").strip():
- value = kb.data.cachedUsersPasswords[user][i].lower().split()[0]
- if value in lut:
- kb.data.cachedUsersPasswords[user][i] += "%s clear-text password: %s" % ('\n' if kb.data.cachedUsersPasswords[user][i][-1] != '\n' else '', lut[value])
- def attackDumpedTable():
- if kb.data.dumpedTable:
- table = kb.data.dumpedTable
- columns = table.keys()
- count = table["__infos__"]["count"]
- if not count:
- return
- infoMsg = "analyzing table dump for possible password hashes"
- logger.info(infoMsg)
- found = False
- col_user = ''
- col_passwords = set()
- attack_dict = {}
- for column in columns:
- if column and column.lower() in COMMON_USER_COLUMNS:
- col_user = column
- break
- for i in xrange(count):
- if not found and i > HASH_RECOGNITION_QUIT_THRESHOLD:
- break
- for column in columns:
- if column == col_user or column == '__infos__':
- continue
- if len(table[column]['values']) <= i:
- continue
- value = table[column]['values'][i]
- if hashRecognition(value):
- found = True
- if col_user and i < len(table[col_user]['values']):
- if table[col_user]['values'][i] not in attack_dict:
- attack_dict[table[col_user]['values'][i]] = []
- attack_dict[table[col_user]['values'][i]].append(value)
- else:
- attack_dict['%s%d' % (DUMMY_USER_PREFIX, i)] = [value]
- col_passwords.add(column)
- if attack_dict:
- infoMsg = "recognized possible password hashes in column%s " % ("s" if len(col_passwords) > 1 else "")
- infoMsg += "'%s'" % ", ".join(col for col in col_passwords)
- logger.info(infoMsg)
- storeHashesToFile(attack_dict)
- message = "do you want to crack them via a dictionary-based attack? %s" % ("[y/N/q]" if conf.multipleTargets else "[Y/n/q]")
- test = readInput(message, default="N" if conf.multipleTargets else "Y")
- if test[0] in ("n", "N"):
- return
- elif test[0] in ("q", "Q"):
- raise SqlmapUserQuitException
- results = dictionaryAttack(attack_dict)
- lut = dict()
- for (_, hash_, password) in results:
- if hash_:
- lut[hash_.lower()] = password
- infoMsg = "postprocessing table dump"
- logger.info(infoMsg)
- for i in xrange(count):
- for column in columns:
- if not (column == col_user or column == '__infos__' or len(table[column]['values']) <= i):
- value = table[column]['values'][i]
- if value and value.lower() in lut:
- table[column]['values'][i] = "%s (%s)" % (getUnicode(table[column]['values'][i]), getUnicode(lut[value.lower()]))
- table[column]['length'] = max(table[column]['length'], len(table[column]['values'][i]))
- def hashRecognition(value):
- retVal = None
- isOracle, isMySQL = Backend.isDbms(DBMS.ORACLE), Backend.isDbms(DBMS.MYSQL)
- if isinstance(value, basestring):
- for name, regex in getPublicTypeMembers(HASH):
- # Hashes for Oracle and old MySQL look the same hence these checks
- if isOracle and regex == HASH.MYSQL_OLD:
- continue
- elif isMySQL and regex == HASH.ORACLE_OLD:
- continue
- elif regex == HASH.CRYPT_GENERIC:
- if any((value.lower() == value, value.upper() == value)):
- continue
- elif re.match(regex, value):
- retVal = regex
- break
- return retVal
- def _bruteProcessVariantA(attack_info, hash_regex, suffix, retVal, proc_id, proc_count, wordlists, custom_wordlist):
- if IS_WIN:
- coloramainit()
- count = 0
- rotator = 0
- hashes = set([item[0][1] for item in attack_info])
- wordlist = Wordlist(wordlists, proc_id, getattr(proc_count, "value", 0), custom_wordlist)
- try:
- for word in wordlist:
- if not attack_info:
- break
- if not isinstance(word, basestring):
- continue
- if suffix:
- word = word + suffix
- try:
- current = __functions__[hash_regex](password=word, uppercase=False)
- count += 1
- if current in hashes:
- for item in attack_info[:]:
- ((user, hash_), _) = item
- if hash_ == current:
- retVal.put((user, hash_, word))
- clearConsoleLine()
- infoMsg = "\r[%s] [INFO] cracked password '%s'" % (time.strftime("%X"), word)
- if user and not user.startswith(DUMMY_USER_PREFIX):
- infoMsg += " for user '%s'\n" % user
- else:
- infoMsg += " for hash '%s'\n" % hash_
- dataToStdout(infoMsg, True)
- attack_info.remove(item)
- elif (proc_id == 0 or getattr(proc_count, "value", 0) == 1) and count % HASH_MOD_ITEM_DISPLAY == 0 or hash_regex == HASH.ORACLE_OLD or hash_regex == HASH.CRYPT_GENERIC and IS_WIN:
- rotator += 1
- if rotator >= len(ROTATING_CHARS):
- rotator = 0
- status = 'current status: %s... %s' % (word.ljust(5)[:5], ROTATING_CHARS[rotator])
- if not hasattr(conf, "api"):
- dataToStdout("\r[%s] [INFO] %s" % (time.strftime("%X"), status))
- except KeyboardInterrupt:
- raise
- except (UnicodeEncodeError, UnicodeDecodeError):
- pass # ignore possible encoding problems caused by some words in custom dictionaries
- except Exception as e:
- warnMsg = "there was a problem while hashing entry: %s (%s). " % (repr(word), e)
- warnMsg += "Please report by e-mail to 'dev@sqlmap.org'"
- logger.critical(warnMsg)
- except KeyboardInterrupt:
- pass
- finally:
- if hasattr(proc_count, "value"):
- with proc_count.get_lock():
- proc_count.value -= 1
- def _bruteProcessVariantB(user, hash_, kwargs, hash_regex, suffix, retVal, found, proc_id, proc_count, wordlists, custom_wordlist):
- if IS_WIN:
- coloramainit()
- count = 0
- rotator = 0
- wordlist = Wordlist(wordlists, proc_id, getattr(proc_count, "value", 0), custom_wordlist)
- try:
- for word in wordlist:
- if found.value:
- break
- current = __functions__[hash_regex](password=word, uppercase=False, **kwargs)
- count += 1
- if not isinstance(word, basestring):
- continue
- if suffix:
- word = word + suffix
- try:
- if hash_ == current:
- if hash_regex == HASH.ORACLE_OLD: # only for cosmetic purposes
- word = word.upper()
- retVal.put((user, hash_, word))
- clearConsoleLine()
- infoMsg = "\r[%s] [INFO] cracked password '%s'" % (time.strftime("%X"), word)
- if user and not user.startswith(DUMMY_USER_PREFIX):
- infoMsg += " for user '%s'\n" % user
- else:
- infoMsg += " for hash '%s'\n" % hash_
- dataToStdout(infoMsg, True)
- found.value = True
- elif (proc_id == 0 or getattr(proc_count, "value", 0) == 1) and count % HASH_MOD_ITEM_DISPLAY == 0:
- rotator += 1
- if rotator >= len(ROTATING_CHARS):
- rotator = 0
- status = 'current status: %s... %s' % (word.ljust(5)[:5], ROTATING_CHARS[rotator])
- if user and not user.startswith(DUMMY_USER_PREFIX):
- status += ' (user: %s)' % user
- if not hasattr(conf, "api"):
- dataToStdout("\r[%s] [INFO] %s" % (time.strftime("%X"), status))
- except KeyboardInterrupt:
- raise
- except (UnicodeEncodeError, UnicodeDecodeError):
- pass # ignore possible encoding problems caused by some words in custom dictionaries
- except Exception as e:
- warnMsg = "there was a problem while hashing entry: %s (%s). " % (repr(word), e)
- warnMsg += "Please report by e-mail to 'dev@sqlmap.org'"
- logger.critical(warnMsg)
- except KeyboardInterrupt:
- pass
- finally:
- if hasattr(proc_count, "value"):
- with proc_count.get_lock():
- proc_count.value -= 1
- def dictionaryAttack(attack_dict):
- suffix_list = [""]
- custom_wordlist = [""]
- hash_regexes = []
- results = []
- resumes = []
- user_hash = []
- processException = False
- foundHash = False
- for (_, hashes) in attack_dict.items():
- for hash_ in hashes:
- if not hash_:
- continue
- hash_ = hash_.split()[0] if hash_ and hash_.strip() else hash_
- regex = hashRecognition(hash_)
- if regex and regex not in hash_regexes:
- hash_regexes.append(regex)
- infoMsg = "using hash method '%s'" % __functions__[regex].func_name
- logger.info(infoMsg)
- for hash_regex in hash_regexes:
- keys = set()
- attack_info = []
- for (user, hashes) in attack_dict.items():
- for hash_ in hashes:
- if not hash_:
- continue
- foundHash = True
- hash_ = hash_.split()[0] if hash_ and hash_.strip() else hash_
- if re.match(hash_regex, hash_):
- item = None
- if hash_regex not in (HASH.CRYPT_GENERIC, HASH.WORDPRESS):
- hash_ = hash_.lower()
- if hash_regex in (HASH.MYSQL, HASH.MYSQL_OLD, HASH.MD5_GENERIC, HASH.SHA1_GENERIC):
- item = [(user, hash_), {}]
- elif hash_regex in (HASH.ORACLE_OLD, HASH.POSTGRES):
- item = [(user, hash_), {'username': user}]
- elif hash_regex in (HASH.ORACLE,):
- item = [(user, hash_), {'salt': hash_[-20:]}]
- elif hash_regex in (HASH.MSSQL, HASH.MSSQL_OLD, HASH.MSSQL_NEW):
- item = [(user, hash_), {'salt': hash_[6:14]}]
- elif hash_regex in (HASH.CRYPT_GENERIC,):
- item = [(user, hash_), {'salt': hash_[0:2]}]
- elif hash_regex in (HASH.WORDPRESS,):
- if ITOA64.index(hash_[3]) < 32:
- item = [(user, hash_), {'salt': hash_[4:12], 'count': 1 << ITOA64.index(hash_[3]), 'prefix': hash_[:12]}]
- else:
- warnMsg = "invalid hash '%s'" % hash_
- logger.warn(warnMsg)
- if item and hash_ not in keys:
- resumed = hashDBRetrieve(hash_)
- if not resumed:
- attack_info.append(item)
- user_hash.append(item[0])
- else:
- infoMsg = "resuming password '%s' for hash '%s'" % (resumed, hash_)
- if user and not user.startswith(DUMMY_USER_PREFIX):
- infoMsg += " for user '%s'" % user
- logger.info(infoMsg)
- resumes.append((user, hash_, resumed))
- keys.add(hash_)
- if not attack_info:
- continue
- if not kb.wordlists:
- while not kb.wordlists:
- # the slowest of all methods hence smaller default dict
- if hash_regex in (HASH.ORACLE_OLD, HASH.WORDPRESS):
- dictPaths = [paths.SMALL_DICT]
- else:
- dictPaths = [paths.WORDLIST]
- message = "what dictionary do you want to use?\n"
- message += "[1] default dictionary file '%s' (press Enter)\n" % dictPaths[0]
- message += "[2] custom dictionary file\n"
- message += "[3] file with list of dictionary files"
- choice = readInput(message, default="1")
- try:
- if choice == "2":
- message = "what's the custom dictionary's location?\n"
- dictPaths = [readInput(message)]
- logger.info("using custom dictionary")
- elif choice == "3":
- message = "what's the list file location?\n"
- listPath = readInput(message)
- checkFile(listPath)
- dictPaths = getFileItems(listPath)
- logger.info("using custom list of dictionaries")
- else:
- logger.info("using default dictionary")
- dictPaths = filter(None, dictPaths)
- for dictPath in dictPaths:
- checkFile(dictPath)
- if os.path.splitext(dictPath)[1].lower() == ".zip":
- _ = zipfile.ZipFile(dictPath, 'r')
- if len(_.namelist()) == 0:
- errMsg = "no file(s) inside '%s'" % dictPath
- raise SqlmapDataException(errMsg)
- else:
- _.open(_.namelist()[0])
- kb.wordlists = dictPaths
- except Exception as ex:
- warnMsg = "there was a problem while loading dictionaries"
- warnMsg += " ('%s')" % getSafeExString(ex)
- logger.critical(warnMsg)
- message = "do you want to use common password suffixes? (slow!) [y/N] "
- test = readInput(message, default="N")
- if test[0] in ("y", "Y"):
- suffix_list += COMMON_PASSWORD_SUFFIXES
- infoMsg = "starting dictionary-based cracking (%s)" % __functions__[hash_regex].func_name
- logger.info(infoMsg)
- for item in attack_info:
- ((user, _), _) = item
- if user and not user.startswith(DUMMY_USER_PREFIX):
- custom_wordlist.append(normalizeUnicode(user))
- if hash_regex in (HASH.MYSQL, HASH.MYSQL_OLD, HASH.MD5_GENERIC, HASH.SHA1_GENERIC):
- for suffix in suffix_list:
- if not attack_info or processException:
- break
- if suffix:
- clearConsoleLine()
- infoMsg = "using suffix '%s'" % suffix
- logger.info(infoMsg)
- retVal = None
- processes = []
- try:
- if _multiprocessing:
- if _multiprocessing.cpu_count() > 1:
- infoMsg = "starting %d processes " % _multiprocessing.cpu_count()
- singleTimeLogMessage(infoMsg)
- gc.disable()
- retVal = _multiprocessing.Queue()
- count = _multiprocessing.Value('i', _multiprocessing.cpu_count())
- for i in xrange(_multiprocessing.cpu_count()):
- p = _multiprocessing.Process(target=_bruteProcessVariantA, args=(attack_info, hash_regex, suffix, retVal, i, count, kb.wordlists, custom_wordlist))
- processes.append(p)
- for p in processes:
- p.daemon = True
- p.start()
- while count.value > 0:
- time.sleep(0.5)
- else:
- warnMsg = "multiprocessing hash cracking is currently "
- warnMsg += "not supported on this platform"
- singleTimeWarnMessage(warnMsg)
- retVal = Queue()
- _bruteProcessVariantA(attack_info, hash_regex, suffix, retVal, 0, 1, kb.wordlists, custom_wordlist)
- except KeyboardInterrupt:
- print
- processException = True
- warnMsg = "user aborted during dictionary-based attack phase (Ctrl+C was pressed)"
- logger.warn(warnMsg)
- for process in processes:
- try:
- process.terminate()
- process.join()
- except (OSError, AttributeError):
- pass
- finally:
- if _multiprocessing:
- gc.enable()
- if retVal:
- conf.hashDB.beginTransaction()
- while not retVal.empty():
- user, hash_, word = item = retVal.get(block=False)
- attack_info = filter(lambda _: _[0][0] != user or _[0][1] != hash_, attack_info)
- hashDBWrite(hash_, word)
- results.append(item)
- conf.hashDB.endTransaction()
- clearConsoleLine()
- else:
- for ((user, hash_), kwargs) in attack_info:
- if processException:
- break
- if any(_[0] == user and _[1] == hash_ for _ in results):
- continue
- count = 0
- found = False
- for suffix in suffix_list:
- if found or processException:
- break
- if suffix:
- clearConsoleLine()
- infoMsg = "using suffix '%s'" % suffix
- logger.info(infoMsg)
- retVal = None
- processes = []
- try:
- if _multiprocessing:
- if _multiprocessing.cpu_count() > 1:
- infoMsg = "starting %d processes " % _multiprocessing.cpu_count()
- singleTimeLogMessage(infoMsg)
- gc.disable()
- retVal = _multiprocessing.Queue()
- found_ = _multiprocessing.Value('i', False)
- count = _multiprocessing.Value('i', _multiprocessing.cpu_count())
- for i in xrange(_multiprocessing.cpu_count()):
- p = _multiprocessing.Process(target=_bruteProcessVariantB, args=(user, hash_, kwargs, hash_regex, suffix, retVal, found_, i, count, kb.wordlists, custom_wordlist))
- processes.append(p)
- for p in processes:
- p.daemon = True
- p.start()
- while count.value > 0:
- time.sleep(0.5)
- found = found_.value != 0
- else:
- warnMsg = "multiprocessing hash cracking is currently "
- warnMsg += "not supported on this platform"
- singleTimeWarnMessage(warnMsg)
- class Value():
- pass
- retVal = Queue()
- found_ = Value()
- found_.value = False
- _bruteProcessVariantB(user, hash_, kwargs, hash_regex, suffix, retVal, found_, 0, 1, kb.wordlists, custom_wordlist)
- found = found_.value
- except KeyboardInterrupt:
- print
- processException = True
- warnMsg = "user aborted during dictionary-based attack phase (Ctrl+C was pressed)"
- logger.warn(warnMsg)
- for process in processes:
- try:
- process.terminate()
- process.join()
- except (OSError, AttributeError):
- pass
- finally:
- if _multiprocessing:
- gc.enable()
- if retVal:
- conf.hashDB.beginTransaction()
- while not retVal.empty():
- user, hash_, word = item = retVal.get(block=False)
- hashDBWrite(hash_, word)
- results.append(item)
- conf.hashDB.endTransaction()
- clearConsoleLine()
- results.extend(resumes)
- if foundHash and len(hash_regexes) == 0:
- warnMsg = "unknown hash format"
- logger.warn(warnMsg)
- if len(results) == 0:
- warnMsg = "no clear password(s) found"
- logger.warn(warnMsg)
- return results
|