mirror of
https://github.com/hashcat/hashcat.git
synced 2025-01-08 14:51:10 +00:00
Merge pull request #1 from holly-o/holly-o-patch-1
Add bitlocker2hashcat.py
This commit is contained in:
commit
02e7692eb9
234
tools/bitlocker2hashcat.py
Normal file
234
tools/bitlocker2hashcat.py
Normal file
@ -0,0 +1,234 @@
|
||||
# Construct a hash for use with hashcat mode 22100
|
||||
# Usage: python3 bitlocker2hashcat.py <bitlocker_image> -o <bitlocker_partition_offset>
|
||||
# Hashcat supports modes $bitlocker$0$ and $bitlocker$1$ and therefore this script will output hashes that relate to a VMK protected by a user password only.
|
||||
# It is not possible to create a hash for VMKs protected by a TPM, and is infeasible to attempt to crack a hash of the recovery password.
|
||||
# Refs: https://github.com/libyal/libbde/blob/main/documentation/BitLocker%20Drive%20Encryption%20(BDE)%20format.asciidoc#encryption_methods
|
||||
|
||||
import argparse
|
||||
|
||||
BITLOCKER_SIGNATURE = '-FVE-FS-'
|
||||
BITLOCKER_TO_GO_SIGNATURE = 'MSWIN4.1'
|
||||
BITLOCKER_GUIDS = {'4967D63B-2E29-4AD8-8399-F6A339E3D001' : 'BitLocker', '4967D63B-2E29-4AD8-8399-F6A339E3D01' : 'BitLocker To Go', '92A84D3B-DD80-4D0E-9E4E-B1E3284EAED8' : 'BitLocker Used Disk Space Only'}
|
||||
PROTECTION_TYPES = {0x0: 'VMK protected with clear key', 0x100: 'VMK protected with TPM', 0x200: 'VMK protected with startup key', 0x500: 'VMK protected with TPM and PIN', 0x800: 'VMK protected with recovery password', 0x2000: 'VMK protected with password'}
|
||||
FVE_ENTRY_TYPES = {0x0: 'None', 0x2: 'VMK', 0x3: 'FVEK', 0x4: 'Validation', 0x6: 'Startup key', 0x7: 'Computer description', 0xb: 'FVEK backup', 0xf: 'Volume header block'}
|
||||
FVE_VALUE_TYPES = {0x0: 'Erased', 0x1: 'Key', 0x2: 'UTF-16 string', 0x3: 'Stretch key', 0x4: 'Use key', 0x5: 'AES-CCM encrypted key', 0x6: 'TPM encoded key', 0x7: 'Validation', 0x8: 'VMK', 0x9: 'External key', 0xa: 'Update', 0xb: 'Error', 0xf: 'Offset and size'}
|
||||
ITERATION_COUNT = 0x100000
|
||||
BITLOCKER_HASH_VERSIONS = [0,1] # 0,1 both supported on hashcat
|
||||
HASHCAT_HASH = []
|
||||
|
||||
def guid_to_hex(guid):
|
||||
guid_parts = guid.split('-')
|
||||
|
||||
search_target = ''.join([guid_parts[0][i:i+2] for i in range(0, len(guid_parts[0]), 2)][::-1])
|
||||
search_target += ''.join([guid_parts[1][i:i+2] for i in range(0, len(guid_parts[1]), 2)][::-1])
|
||||
search_target += ''.join([guid_parts[2][i:i+2] for i in range(0, len(guid_parts[2]), 2)][::-1])
|
||||
search_target += guid_parts[3]
|
||||
search_target += guid_parts[4]
|
||||
|
||||
return search_target
|
||||
|
||||
def hex_to_guid(hex_str):
|
||||
|
||||
guid_parts = [0] * 5
|
||||
guid_parts[0] = hex_str[0:8]
|
||||
guid_parts[1] = hex_str[8:12]
|
||||
guid_parts[2] = hex_str[12:16]
|
||||
guid_parts[3] = hex_str[16:20]
|
||||
guid_parts[4] = hex_str[20:]
|
||||
|
||||
guid = ''.join([guid_parts[0][i:i+2] for i in range(0, len(guid_parts[0]), 2)][::-1])
|
||||
guid += '-'
|
||||
guid += ''.join([guid_parts[1][i:i+2] for i in range(0, len(guid_parts[1]), 2)][::-1])
|
||||
guid += '-'
|
||||
guid += ''.join([guid_parts[2][i:i+2] for i in range(0, len(guid_parts[2]), 2)][::-1])
|
||||
guid += '-'
|
||||
guid += guid_parts[3]
|
||||
guid += '-'
|
||||
guid += guid_parts[4]
|
||||
|
||||
return guid.upper()
|
||||
|
||||
def uint_to_int(b):
|
||||
return int(b[::-1].hex(), 16)
|
||||
|
||||
def parse_FVEK(fvek_data):
|
||||
print("\nParsing FVEK...")
|
||||
nonce = fvek_data[:12]
|
||||
mac = fvek_data[12:28]
|
||||
enc_data = fvek_data[28:]
|
||||
|
||||
print("Mac:", mac.hex())
|
||||
print("Nonce:", nonce.hex())
|
||||
print("Encrypted data:", enc_data.hex())
|
||||
|
||||
return nonce, mac, enc_data
|
||||
|
||||
def parse_stretch_key(data):
|
||||
print("\nParsing stretch key...")
|
||||
encryption_method = hex(uint_to_int(data[0:4]))
|
||||
salt = data[4:20]
|
||||
print("Encryption method:", encryption_method)
|
||||
print("Salt:", salt.hex())
|
||||
current_pos = 0
|
||||
aes_ccm_data = data[20:]
|
||||
current_pos, data, value_type = parse_fve_metadata_entry(current_pos, aes_ccm_data)
|
||||
nonce, mac, enc_data = parse_aes_ccm_encrypted_key(data)
|
||||
|
||||
return salt, nonce, mac, enc_data
|
||||
|
||||
def generate_hashcat_hash(salt, nonce, mac, enc_data):
|
||||
print("\nFound hashcat hash!")
|
||||
for version in BITLOCKER_HASH_VERSIONS:
|
||||
generated_hash = f"$bitlocker${version}${len(salt)}${salt.hex()}${ITERATION_COUNT}${len(nonce)}${nonce.hex()}${len(mac + enc_data)}${(mac + enc_data).hex()}"
|
||||
print(generated_hash)
|
||||
HASHCAT_HASH.append(generated_hash)
|
||||
|
||||
def parse_aes_ccm_encrypted_key(data):
|
||||
print("Parsing AES CCM key...")
|
||||
nonce, mac, enc_data = parse_FVEK(data)
|
||||
return nonce, mac, enc_data
|
||||
|
||||
def parse_description(data):
|
||||
print("\nParsing description...")
|
||||
print(f"Info: {data.decode('utf-16')}")
|
||||
return
|
||||
|
||||
def parse_volume_header_block(data):
|
||||
print("\nParsing volume header block...")
|
||||
block_offset = uint_to_int(data[0:8])
|
||||
block_size = uint_to_int(data[8:16])
|
||||
print(f"Block offset: {hex(block_offset)}")
|
||||
print(f"Block size: {block_size}")
|
||||
|
||||
def parse_VMK(VMK_data):
|
||||
print("\nParsing VMK...")
|
||||
guid = hex_to_guid(VMK_data[:16].hex())
|
||||
protection_type = uint_to_int(VMK_data[26:28])
|
||||
properties = VMK_data[28:]
|
||||
print("GUID:", guid)
|
||||
print(f"Protection type: {hex(protection_type)} = {PROTECTION_TYPES.get(protection_type)}")
|
||||
|
||||
# only try parse properties if correct protection type
|
||||
if protection_type == 0x2000:
|
||||
current_pos = 28
|
||||
while current_pos < len(properties):
|
||||
current_pos, data, value_type = parse_fve_metadata_entry(current_pos, VMK_data[current_pos:])
|
||||
if value_type == 0x3:
|
||||
salt, strech_nonce, stretch_mac, stretch_enc_data = parse_stretch_key(data)
|
||||
if value_type == 0x5:
|
||||
nonce, mac, enc_data = parse_aes_ccm_encrypted_key(data)
|
||||
generate_hashcat_hash(salt, nonce, mac, enc_data)
|
||||
|
||||
return
|
||||
|
||||
def parse_fve_metadata_block(block):
|
||||
print('\nParsing FVE block...')
|
||||
signature = block[0:8]
|
||||
fve_metadata_header = block[64:64+48]
|
||||
metadata_size = parse_fve_metadata_header(fve_metadata_header)
|
||||
|
||||
entry_size = uint_to_int(block[112:114])
|
||||
current_pos = 112
|
||||
while current_pos < metadata_size:
|
||||
current_pos, data, value_type = parse_fve_metadata_entry(current_pos, block[current_pos:current_pos+entry_size])
|
||||
if value_type == 0x2:
|
||||
parse_description(data)
|
||||
if value_type == 0x5:
|
||||
parse_aes_ccm_encrypted_key(data)
|
||||
if value_type == 0x8:
|
||||
parse_VMK(data)
|
||||
if value_type == 0xf:
|
||||
parse_volume_header_block(data)
|
||||
|
||||
try:
|
||||
entry_size = uint_to_int(block[current_pos:current_pos+2])
|
||||
except:
|
||||
return
|
||||
|
||||
def parse_fve_metadata_entry(current_pos, block):
|
||||
print("\nParsing FVE metadata entry...")
|
||||
entry_size = uint_to_int(block[0:2])
|
||||
entry_type = uint_to_int(block[2:4])
|
||||
value_type = uint_to_int(block[4:6])
|
||||
version = hex(uint_to_int(block[6:8]))
|
||||
data = block[8:entry_size]
|
||||
|
||||
print(f"Entry size: {entry_size}")
|
||||
print(f"Entry type: {hex(entry_type)} = {FVE_ENTRY_TYPES.get(entry_type)}")
|
||||
print(f"Value type: {hex(value_type)} = {FVE_VALUE_TYPES.get(value_type)}")
|
||||
|
||||
current_pos = current_pos + entry_size
|
||||
|
||||
return current_pos, data, value_type
|
||||
|
||||
def parse_fve_metadata_header(block):
|
||||
print("\nParsing FVE metadata header...")
|
||||
metadata_size = uint_to_int(block[0:4])
|
||||
volume_guid = hex_to_guid(block[16:32].hex())
|
||||
nonce_counter = uint_to_int(block[32:36])
|
||||
encryption_method = hex(uint_to_int(block[36:40]))
|
||||
|
||||
print("Metadata size:", metadata_size)
|
||||
print("Volume GUID:", volume_guid)
|
||||
print("Encryption method:", encryption_method)
|
||||
|
||||
return metadata_size
|
||||
|
||||
def main():
|
||||
|
||||
p = argparse.ArgumentParser()
|
||||
p.add_argument('image_path', help="Path to encrypted BitLocker image")
|
||||
p.add_argument('-o', '--offset', help='Offset in image where BitLocker partition starts, default=0')
|
||||
args = p.parse_args()
|
||||
bitlocker_partition = args.image_path
|
||||
|
||||
bitlocker_offset = 0
|
||||
if args.offset:
|
||||
bitlocker_offset = int(args.offset)
|
||||
|
||||
with open(bitlocker_partition, 'rb') as fp:
|
||||
|
||||
fp.seek(bitlocker_offset)
|
||||
boot_entry_point = fp.read(3)
|
||||
|
||||
header = fp.read(8)
|
||||
if header.decode('latin-1') not in [BITLOCKER_SIGNATURE, BITLOCKER_TO_GO_SIGNATURE]:
|
||||
print("[!] Supplied image path is not a BitLocker partition. Try specifiying the offset of the BitLocker partition with -o")
|
||||
exit()
|
||||
print(f'[+] BitLocker signature found: {header.decode()}')
|
||||
sector_size = uint_to_int(fp.read(2))
|
||||
|
||||
if header.decode('latin-1') == BITLOCKER_SIGNATURE:
|
||||
guid_offset = 0xa0
|
||||
if header.decode('latin-1') == BITLOCKER_TO_GO_SIGNATURE:
|
||||
guid_offset = 0x1a8
|
||||
|
||||
fp.seek(guid_offset + bitlocker_offset)
|
||||
volume_guid = fp.read(16)
|
||||
print(f'[+] Identified volume GUID: {hex_to_guid(volume_guid.hex())} = {BITLOCKER_GUIDS.get(hex_to_guid(volume_guid.hex()))}')
|
||||
|
||||
# get FVE metadata block addresses
|
||||
FVE_metadata_offsets = [hex(uint_to_int(fp.read(8)) + bitlocker_offset) for _ in range(3)]
|
||||
print(f'[+] FVE metadata info found at offsets {FVE_metadata_offsets}')
|
||||
|
||||
# all metadata blocks should be the same
|
||||
for f in FVE_metadata_offsets:
|
||||
|
||||
fp.seek(int(f, 16))
|
||||
FVE_metadata_block = fp.read(2048)
|
||||
parse_fve_metadata_block(FVE_metadata_block)
|
||||
|
||||
break
|
||||
|
||||
if HASHCAT_HASH == []:
|
||||
print("\nNo hashes associated with the user password found. Exiting...")
|
||||
else:
|
||||
print("\nThe following hashcat hashes were found:")
|
||||
for bitlocker_hash in HASHCAT_HASH:
|
||||
print(bitlocker_hash)
|
||||
|
||||
return
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
Loading…
Reference in New Issue
Block a user