# This file is part of creddump. # # creddump is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # creddump is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with creddump. If not, see . """ @author: Brendan Dolan-Gavitt @license: GNU General Public License 2.0 or later @contact: bdolangavitt@wesleyan.edu """ import hashlib import os from .rawreg import * from ..addrspace import HiveFileAddressSpace from .hashdump import get_bootkey, str_to_key from foreign.client_handling.lazagne.config.crypto.rc4 import RC4 from foreign.client_handling.lazagne.config.crypto.pyDes import des, ECB from foreign.client_handling.lazagne.config.crypto.pyaes.aes import AESModeOfOperationCBC def get_lsa_key(secaddr, bootkey, vista): root = get_root(secaddr) if not root: return None if vista: enc_reg_key = open_key(root, [b"Policy", b"PolEKList"]) else: enc_reg_key = open_key(root, [b"Policy", b"PolSecretEncryptionKey"]) if not enc_reg_key: return None enc_reg_value = enc_reg_key.ValueList.List[0] if not enc_reg_value: return None obf_lsa_key = secaddr.read(enc_reg_value.Data.value, enc_reg_value.DataLength.value) if not obf_lsa_key: return None if not vista: md5 = hashlib.md5() md5.update(bootkey) for i in range(1000): md5.update(obf_lsa_key[60:76]) rc4key = md5.digest() rc4 = RC4(rc4key) lsa_key = rc4.encrypt(obf_lsa_key[12:60]) lsa_key = lsa_key[0x10:0x20] else: lsa_key = decrypt_aes(obf_lsa_key, bootkey) lsa_key = lsa_key[68:100] return lsa_key def decrypt_secret(secret, key): """Python implementation of SystemFunction005. Decrypts a block of data with DES using given key. Note that key can be longer than 7 bytes.""" decrypted_data = b'' j = 0 # key index for i in range(0, len(secret), 8): enc_block = secret[i:i + 8] block_key = key[j:j + 7] des_key = str_to_key(block_key) crypter = des(des_key, ECB) try: decrypted_data += crypter.decrypt(enc_block) except Exception: continue j += 7 if len(key[j:j + 7]) < 7: j = len(key[j:j + 7]) (dec_data_len,) = unpack("