-
Notifications
You must be signed in to change notification settings - Fork 2
/
SecureCRTDecrypt.py
73 lines (57 loc) · 2.19 KB
/
SecureCRTDecrypt.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
# -*- coding: utf-8 -*-
"""
解密secureCRT保存的密码
1. 安装pycrypto,pip install pycrypto(不支持py3)
2. 找到密码保存位置,每台服务器一个ini文件,windows系统位于
* 用户名\AppData\Roaming\VanDyke\Config\Sessions\ (安装版)
* SecureCRTSecureFX_HH_x86_7.0.0.326\Data\Settings\Config\Sessions (绿色移动版)
3. 执行脚本,python SecureCRTDecrypt.py [filename...],例如
>> [@bx_5_219 /tmp]# python SecureCRTDecrypt.py 10.10.123.123.ini
>> 10.10.123.123.ini
>> ssh root@10.10.70.30 # I'mpassword
"""
from Crypto.Cipher import Blowfish
import argparse
import re
def decrypt(password):
c1 = Blowfish.new('5F B0 45 A2 94 17 D9 16 C6 C6 A2 FF 06 41 82 B7'.replace(' ', '').decode('hex'),
Blowfish.MODE_CBC, '\x00' * 8)
c2 = Blowfish.new('24 A6 3D DE 5B D3 B3 82 9C 7E 06 F4 08 16 AA 07'.replace(' ', '').decode('hex'),
Blowfish.MODE_CBC, '\x00' * 8)
padded = c1.decrypt(c2.decrypt(password.decode('hex'))[4:-4])
p = ''
while padded[:2] != '\x00\x00':
p += padded[:2]
padded = padded[2:]
return p.decode('UTF-16')
REGEX_HOSTNAME = re.compile(ur'S:"Hostname"=([^\r\n]*)')
REGEX_PASWORD = re.compile(ur'S:"Password"=u([0-9a-f]+)')
REGEX_PORT = re.compile(ur'D:"\[SSH2\] Port"=([0-9a-f]{8})')
REGEX_USERNAME = re.compile(ur'S:"Username"=([^\r\n]*)')
def hostname(x):
m = REGEX_HOSTNAME.search(x)
if m:
return m.group(1)
return '???'
def password(x):
m = REGEX_PASWORD.search(x)
if m:
return decrypt(m.group(1))
return '???'
def port(x):
m = REGEX_PORT.search(x)
if m:
return '-p %d ' % (int(m.group(1), 16))
return ''
def username(x):
m = REGEX_USERNAME.search(x)
if m:
return m.group(1) + '@'
return ''
parser = argparse.ArgumentParser(description='Tool to decrypt SSHv2 passwords in VanDyke Secure CRT session files')
parser.add_argument('files', type=argparse.FileType('r'), nargs='+', help='session file(s)')
args = parser.parse_args()
for f in args.files:
c = f.read().replace('\x00', '')
print f.name
print "ssh %s%s%s # %s" % (port(c), username(c), hostname(c), password(c))