简述
渗透测试过程中,在遇到登陆界面的时候,第一想到的就是爆破。如果系统在传输数据时没有任何加密,没有使用验证码时,还有很大机会爆破成功呢。但是如果使用了验证码切用户名或密码被js加密时,该如何爆破呢?
通常使用的方法:
简单的验证码,可以通过python库进行识别; 加密的数据,往往会通过审计加密方法,然后进行重新计算后,再进行爆破。
个人项目经历,在某国企单位驻场渗透时,经常发现以下情况的站点:
1、 登陆界面password数据通过js加密;
2、 使用验证码,但大多数系统的验证码可以重复利用
Js加密的站点,由于不是同一个人开发的,使用常用审计加密算法的方法去爆破无疑给自己增加难度。结合上述种种原因,索性直接不管js加密算法,通过python库,利用网站js加密文件直接对密码字典进行加密。然后通过burp爆破!
Python JS库:execjs
安装execjs
代码语言:javascript复制pip install PyExecJS
或者
代码语言:javascript复制easy_install PyExecJS
安装JS环境依赖PhantomJS
代码语言:javascript复制brew cask install phantomjs
execjs的简单使用
代码语言:javascript复制>>> import execjs>>> execjs.eval("'red yellow blue'.split(' ')")['red', 'yellow', 'blue']>>> ctx = execjs.compile("""... function add(x, y) {... return x y;... }... """)>>> ctx.call("add", 1, 2)3
Python脚本简单实现js加密
网上搬的js加密文件
代码语言:javascript复制*@param username*@param passwordOrgin*@return encrypt password for $username who use orign password $passwordOrgin***/function encrypt(username, passwordOrgin) {return hex_sha1(username hex_sha1(passwordOrgin));}function hex_sha1(s, hexcase) {if (!(arguments) || !(arguments.length) || arguments.length < 1) {return binb2hex(core_sha1(AlignSHA1("aiact@163.com")), true);} else {if (arguments.length == 1) {return binb2hex(core_sha1(AlignSHA1(arguments[0])), true);} else {return binb2hex(core_sha1(AlignSHA1(arguments[0])), arguments[1]);}}// return binb2hex(core_sha1(AlignSHA1(s)),hexcase);}/**//** Perform a simple self-test to see if the VM is working*/function sha1_vm_test() {return hex_sha1("abc",false) == "a9993e364706816aba3e25717850c26c9cd0d89d";}/**//** Calculate the SHA-1 of an array of big-endian words, and a bit length*/function core_sha1(blockArray) {var x = blockArray; //append paddingvar w = Array(80);var a = 1732584193;var b = -271733879;var c = -1732584194;var d = 271733878;var e = -1009589776;for (var i = 0; i < x.length; i = 16) { //每次处理512位 16*32var olda = a;var oldb = b;var oldc = c;var oldd = d;var olde = e;for (var j = 0; j < 80; j = 1) { //对每个512位进行80步操作if (j < 16) {w[j] = x[i j];} else {w[j] = rol(w[j - 3] ^ w[j - 8] ^ w[j - 14] ^ w[j - 16], 1);}var t = safe_add(safe_add(rol(a, 5), sha1_ft(j, b, c, d)), safe_add(safe_add(e, w[j]), sha1_kt(j)));e = d;d = c;c = rol(b, 30);b = a;a = t;}a = safe_add(a, olda);b = safe_add(b, oldb);c = safe_add(c, oldc);d = safe_add(d, oldd);e = safe_add(e, olde);}return new Array(a, b, c, d, e);}/**//** Perform the appropriate triplet combination function for the current iteration* 返回对应F函数的值*/function sha1_ft(t, b, c, d) {if (t < 20) {return (b & c) | ((~b) & d);}if (t < 40) {return b ^ c ^ d;}if (t < 60) {return (b & c) | (b & d) | (c & d);}return b ^ c ^ d; //t<80}/**//** Determine the appropriate additive constant for the current iteration* 返回对应的Kt值*/function sha1_kt(t) {return (t < 20) ? 1518500249 : (t < 40) ? 1859775393 : (t < 60) ? -1894007588 : -899497514;}/**//** Add integers, wrapping at 2^32. This uses 16-bit operations internally* to work around bugs in some JS interpreters.* 将32位数拆成高16位和低16位分别进行相加,从而实现 MOD 2^32 的加法*/function safe_add(x, y) {var lsw = (x & 65535) (y & 65535);var msw = (x >> 16) (y >> 16) (lsw >> 16);return (msw << 16) | (lsw & 65535);}/**//** Bitwise rotate a 32-bit number to the left.* 32位二进制数循环左移*/function rol(num, cnt) {return (num << cnt) | (num >>> (32 - cnt));}/**//** The standard SHA1 needs the input string to fit into a block* This function align the input string to meet the requirement*/function AlignSHA1(str) {var nblk = ((str.length 8) >> 6) 1, blks = new Array(nblk * 16);for (var i = 0; i < nblk * 16; i = 1) {blks[i] = 0;}for (i = 0; i < str.length; i = 1) {blks[i >> 2] |= str.charCodeAt(i) << (24 - (i & 3) * 8);}blks[i >> 2] |= 128 << (24 - (i & 3) * 8);blks[nblk * 16 - 1] = str.length * 8;return blks;}/**//** Convert an array of big-endian words to a hex string.*/function binb2hex(binarray, hexcase) {var hex_tab = hexcase ? "0123456789ABCDEF" : "0123456789abcdef";var str = "";for (var i = 0; i < binarray.length * 4; i = 1) {str = hex_tab.charAt((binarray[i >> 2] >> ((3 - i % 4) * 8 4)) & 15) hex_tab.charAt((binarray[i >> 2] >> ((3 - i % 4) * 8)) & 15);}return str;}
简单加密python文件
代码语言:javascript复制#coding:utf-8import execjswith open ('enpassword.js','r') as strjs:src = strjs.read()phantom = execjs.get('PhantomJS') #调用JS依赖环境getpass = phantom.compile(src) #编译执行js脚本mypass = getpass.call('encrypt', 'admin','admin') print(mypass) #输出密码
执行脚本,输出加密后的密文
简单优化脚本
添加批量加密功能
代码语言:javascript复制def Encode(jsfile, username, passfile):print("[ ] 正在进行加密,请稍后......")with open (jsfile,'r') as strjs:src = strjs.read()phantom = execjs.get('PhantomJS') #调用JS依赖环境getpass = phantom.compile(src) #编译执行js脚本with open(passfile, 'r') as strpass:for passwd in strpass.readlines():passwd = passwd.strip()mypass = getpass.call('encrypt', username, passwd) #传递参数with open("pass_encode.txt", 'a ') as p:p.write(mypass "n")print("