2019-02-18 13:24:45 +00:00
|
|
|
#!/usr/bin/env perl
|
|
|
|
|
|
|
|
##
|
|
|
|
## Author......: See docs/credits.txt
|
|
|
|
## License.....: MIT
|
|
|
|
##
|
|
|
|
|
|
|
|
use strict;
|
|
|
|
use warnings;
|
|
|
|
|
|
|
|
use Crypt::RC4;
|
|
|
|
use Digest::SHA qw (sha1);
|
|
|
|
use Encode;
|
|
|
|
|
|
|
|
sub module_constraints { [[-1, -1], [-1, -1], [0, 15], [32, 32], [-1, -1]] }
|
|
|
|
|
|
|
|
sub module_generate_hash
|
|
|
|
{
|
|
|
|
my $word = shift;
|
|
|
|
my $salt = shift;
|
|
|
|
my $param = shift;
|
|
|
|
my $param2 = shift;
|
2020-03-16 15:30:35 +00:00
|
|
|
my $param3 = shift;
|
2019-02-18 13:24:45 +00:00
|
|
|
|
|
|
|
my $salt_bin = pack ("H*", $salt);
|
|
|
|
|
|
|
|
my $tmp = sha1 ($salt_bin. encode ("UTF-16LE", $word));
|
|
|
|
|
|
|
|
my $version;
|
|
|
|
|
|
|
|
if (defined $param2)
|
|
|
|
{
|
|
|
|
$version = $param2;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
$version = (unpack ("L", $tmp) & 1) ? 3 : 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
my $rc4_key = sha1 ($tmp . "\x00\x00\x00\x00");
|
|
|
|
|
|
|
|
if ($version == 3)
|
|
|
|
{
|
|
|
|
$rc4_key = substr ($rc4_key, 0, 5) . "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00";
|
|
|
|
}
|
|
|
|
|
|
|
|
my $m = Crypt::RC4->new (substr ($rc4_key, 0, 16));
|
|
|
|
|
|
|
|
my $encdata;
|
|
|
|
|
|
|
|
if (defined $param)
|
|
|
|
{
|
|
|
|
$encdata = $m->RC4 (pack ("H*", $param));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
$encdata = "A" x 16; ## can be anything
|
|
|
|
}
|
|
|
|
|
|
|
|
my $data1_buf = $encdata;
|
|
|
|
my $data2_buf = sha1 (substr ($data1_buf, 0, 16));
|
|
|
|
|
|
|
|
$m = Crypt::RC4->new (substr ($rc4_key, 0, 16));
|
|
|
|
|
|
|
|
my $encrypted1 = $m->RC4 ($data1_buf);
|
|
|
|
my $encrypted2 = $m->RC4 ($data2_buf);
|
|
|
|
|
2020-03-16 15:30:35 +00:00
|
|
|
|
|
|
|
my $secblock = "";
|
|
|
|
|
|
|
|
if ($version == 3)
|
|
|
|
{
|
|
|
|
my $key2 = substr (sha1 ($tmp . "\x01\x00\x00\x00"), 0, 5) . "\x00" x 11;
|
|
|
|
|
|
|
|
my $rc4 = Crypt::RC4->new ($key2);
|
|
|
|
|
|
|
|
if (defined $param3) # verify/decrypt:
|
|
|
|
{
|
|
|
|
if (length ($param3) > 0)
|
|
|
|
{
|
|
|
|
my $decrypted = $rc4->RC4 (pack ("H*", $param3));
|
|
|
|
|
|
|
|
# count the number of NUL (\x00) bytes:
|
|
|
|
|
|
|
|
my $num_nul_bytes = 0;
|
|
|
|
|
|
|
|
for (my $i = 0; $i < 32; $i++)
|
|
|
|
{
|
|
|
|
$num_nul_bytes++ if (substr ($decrypted, $i, 1) eq "\x00");
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($num_nul_bytes < 10)
|
|
|
|
{
|
|
|
|
$secblock = "*"; # incorrect/fake/empty result
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
$secblock = "*$param3";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (random_number (0, 1) == 1) # the second block data is optional
|
|
|
|
{
|
|
|
|
my $num_zeros = random_number (10, 32); # at least 10 NUL bytes
|
|
|
|
|
|
|
|
$secblock = "\x00" x $num_zeros;
|
|
|
|
|
|
|
|
# fill the buffer with some random bytes (up to 32 bytes total):
|
|
|
|
|
|
|
|
for (my $i = 0; $i < 32 - $num_zeros; $i++)
|
|
|
|
{
|
|
|
|
my $idx = random_number (0, $num_zeros + $i); # insert at random position
|
|
|
|
|
|
|
|
my $c = random_bytes (1); # 0x00-0xff
|
|
|
|
|
|
|
|
$secblock = substr ($secblock, 0, $idx) . $c . substr ($secblock, $idx);
|
|
|
|
}
|
|
|
|
|
|
|
|
$secblock = $rc4->RC4 ($secblock);
|
|
|
|
|
|
|
|
$secblock = "*" . unpack ("H*", $secblock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
my $hash = sprintf ("\$oldoffice\$%d*%s*%s*%s%s", $version, $salt, unpack ("H*", $encrypted1), unpack ("H*", $encrypted2), $secblock);
|
2019-02-18 13:24:45 +00:00
|
|
|
|
|
|
|
return $hash;
|
|
|
|
}
|
|
|
|
|
|
|
|
sub module_verify_hash
|
|
|
|
{
|
|
|
|
my $line = shift;
|
|
|
|
|
|
|
|
# Office Old $3 $4
|
|
|
|
my ($hash_in, $word) = split ":", $line;
|
|
|
|
|
2019-02-19 11:50:57 +00:00
|
|
|
return unless defined $hash_in;
|
|
|
|
return unless defined $word;
|
2019-02-18 13:24:45 +00:00
|
|
|
|
|
|
|
my @data = split /\*/, $hash_in;
|
|
|
|
|
2020-03-16 15:30:35 +00:00
|
|
|
my $num_fields = scalar @data;
|
|
|
|
|
|
|
|
return unless (($num_fields == 4) || ($num_fields == 5));
|
2019-02-18 13:24:45 +00:00
|
|
|
|
|
|
|
my $signature = shift @data;
|
|
|
|
|
2019-02-19 11:50:57 +00:00
|
|
|
return unless (($signature eq '$oldoffice$3') || ($signature eq '$oldoffice$4'));
|
2019-02-18 13:24:45 +00:00
|
|
|
|
2019-02-19 11:50:57 +00:00
|
|
|
return unless (length $data[0] == 32);
|
|
|
|
return unless (length $data[1] == 32);
|
|
|
|
return unless (length $data[2] == 40);
|
2019-02-18 13:24:45 +00:00
|
|
|
|
|
|
|
my $salt = shift @data;
|
|
|
|
my $param = shift @data;
|
|
|
|
my $param2 = substr ($signature, 11, 1);
|
|
|
|
|
2020-03-16 15:30:35 +00:00
|
|
|
my $param3 = "";
|
|
|
|
|
|
|
|
if ($num_fields == 5)
|
|
|
|
{
|
|
|
|
shift @data; # ignore the "digest"
|
|
|
|
|
|
|
|
$param3 = shift @data;
|
|
|
|
}
|
|
|
|
|
2019-02-18 13:24:45 +00:00
|
|
|
return unless defined $salt;
|
|
|
|
return unless defined $word;
|
|
|
|
return unless defined $param;
|
|
|
|
return unless defined $param2;
|
|
|
|
|
|
|
|
$word = pack_if_HEX_notation ($word);
|
|
|
|
|
2020-03-16 15:30:35 +00:00
|
|
|
my $new_hash = module_generate_hash ($word, $salt, $param, $param2, $param3);
|
2019-02-18 13:24:45 +00:00
|
|
|
|
|
|
|
return ($new_hash, $word);
|
|
|
|
}
|
|
|
|
|
|
|
|
1;
|