mirror of
https://github.com/moonD4rk/HackBrowserData.git
synced 2026-05-19 18:58:03 +02:00
591b97ce6d
* feat: Refactor crypto decryption functions for consistency and error handling - Close #301 - Refactored and renamed decryption functions across multiple files for consistency - Updated cookie sorting method to sort in descending order - Added new encryption functions for AES in CBC and GCM modes and DES in CBC mode - Added error handling to decryption functions and created new error variables for invalid ciphertext length and decode failures - Test cases added for encryption and decryption functions - Removed unused code and imports. * chore: Add new words to .typos.toml dictionary - Add new terms to `.typos.toml` dictionary - Improve code formatting and readability - Refactor functions for better performance - Update comments and documentation - Resolve minor bugs and errors * refactor: Refactor crypto package for better structure and readability - Refactored and cleaned up crypto package code for better readability - Renamed `ToByteArray` method to `bytes` for consistency - Modified `DecryptWithDPAPI` method to use `outBlob.bytes()` for efficiency - Added comments and removed unused methods in `loginPBE` - Refactored `nssPBE` and `metaPBE` Decrypt methods to use `deriveKeyAndIV` helper method - Improved overall maintainability and organization of codebase * refactor: Refactor firefox password encryption and decryption. - Implement ASN1PBE interface with various PBE struct types and encryption/decryption methods - Fix naming and remove unused variables in browsingdata and crypto files - Add tests for ASN1PBE implementation using external assertion package - Refactor and improve error handling in firefox file functions related to master key retrieval - Add input validation and AES-GCM encryption function to crypto file
44 lines
1007 B
Go
44 lines
1007 B
Go
//go:build windows
|
|
|
|
package chromium
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"errors"
|
|
"log/slog"
|
|
"os"
|
|
|
|
"github.com/tidwall/gjson"
|
|
|
|
"github.com/moond4rk/hackbrowserdata/crypto"
|
|
"github.com/moond4rk/hackbrowserdata/item"
|
|
"github.com/moond4rk/hackbrowserdata/utils/fileutil"
|
|
)
|
|
|
|
var errDecodeMasterKeyFailed = errors.New("decode master key failed")
|
|
|
|
func (c *Chromium) GetMasterKey() ([]byte, error) {
|
|
b, err := fileutil.ReadFile(item.ChromiumKey.TempFilename())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer os.Remove(item.ChromiumKey.TempFilename())
|
|
|
|
encryptedKey := gjson.Get(b, "os_crypt.encrypted_key")
|
|
if !encryptedKey.Exists() {
|
|
return nil, nil
|
|
}
|
|
|
|
key, err := base64.StdEncoding.DecodeString(encryptedKey.String())
|
|
if err != nil {
|
|
return nil, errDecodeMasterKeyFailed
|
|
}
|
|
c.masterKey, err = crypto.DecryptWithDPAPI(key[5:])
|
|
if err != nil {
|
|
slog.Error("decrypt master key failed", "err", err)
|
|
return nil, err
|
|
}
|
|
slog.Info("get master key success", "browser", c.name)
|
|
return c.masterKey, nil
|
|
}
|