mirror of
https://github.com/moonD4rk/HackBrowserData.git
synced 2026-05-19 18:58:03 +02:00
e48f35cfd3
* refactor: Refactor logging to use structured slog package. - Remove `gookit` dependencies from `go.sum` - Improve error logging in multiple packages by replacing `log` with `log/slog` - Update dependencies in `go.mod` - Add new `logger` package with test cases - Refactor logging statements in multiple packages to use `slog` instead of `log` - Change logging format and level in multiple packages for better structured logging * refactor: Refactor logger package and add handler interface - Refactor logger package - Rename `defaultHandler` to `DefaultLogger` - Move `ReplaceAttr` function to `Logger` struct - Implement `LogHandler` struct with `slog.Handler` interface - Add new `Logger` methods for configuration - Add `SetMaxLevel`, `SetJSONHandler`, `SetTextHandler`, `SetOutput`, `SetVerbose`, `SetReplaceAttrFunc` - Add verbose flag to `cmd/hack-browser-data/main.go` to increase logging * refactor: Refactor logger package to use simplified handler initialization. - Refactor logger package to use Default instead of DefaultLogger - Update `NewHandler` method to correctly reference `Default` logger and simplify handler initialization - Update tests for logger to reflect changes in Default usage - Rename `DefaultLogger` to `Default` and update comments to better reflect its purpose - Update function calls in hack-browser-data main.go to reflect logger package updates * refactor: Refactor logging in Chromium implementation Refactor logging and simplify decryption in chromium files - Replace logger package import with shared slog package - Change logging messages to use slog instead of logger - Simplify decryption process by removing first 5 characters of encrypted key - Refactor error logging in linux file to use shared slog package - Replace string concatenation with formatted string in linux error message
153 lines
3.7 KiB
Go
153 lines
3.7 KiB
Go
package cookie
|
|
|
|
import (
|
|
"database/sql"
|
|
"log/slog"
|
|
"os"
|
|
"sort"
|
|
"time"
|
|
|
|
// import sqlite3 driver
|
|
_ "github.com/mattn/go-sqlite3"
|
|
|
|
"github.com/moond4rk/hackbrowserdata/crypto"
|
|
"github.com/moond4rk/hackbrowserdata/item"
|
|
"github.com/moond4rk/hackbrowserdata/utils/typeutil"
|
|
)
|
|
|
|
type ChromiumCookie []cookie
|
|
|
|
type cookie struct {
|
|
Host string
|
|
Path string
|
|
KeyName string
|
|
encryptValue []byte
|
|
Value string
|
|
IsSecure bool
|
|
IsHTTPOnly bool
|
|
HasExpire bool
|
|
IsPersistent bool
|
|
CreateDate time.Time
|
|
ExpireDate time.Time
|
|
}
|
|
|
|
const (
|
|
queryChromiumCookie = `SELECT name, encrypted_value, host_key, path, creation_utc, expires_utc, is_secure, is_httponly, has_expires, is_persistent FROM cookies`
|
|
)
|
|
|
|
func (c *ChromiumCookie) Parse(masterKey []byte) error {
|
|
db, err := sql.Open("sqlite3", item.ChromiumCookie.TempFilename())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer os.Remove(item.ChromiumCookie.TempFilename())
|
|
defer db.Close()
|
|
rows, err := db.Query(queryChromiumCookie)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer rows.Close()
|
|
for rows.Next() {
|
|
var (
|
|
key, host, path string
|
|
isSecure, isHTTPOnly, hasExpire, isPersistent int
|
|
createDate, expireDate int64
|
|
value, encryptValue []byte
|
|
)
|
|
if err = rows.Scan(&key, &encryptValue, &host, &path, &createDate, &expireDate, &isSecure, &isHTTPOnly, &hasExpire, &isPersistent); err != nil {
|
|
slog.Error("scan chromium cookie error", "err", err)
|
|
}
|
|
|
|
cookie := cookie{
|
|
KeyName: key,
|
|
Host: host,
|
|
Path: path,
|
|
encryptValue: encryptValue,
|
|
IsSecure: typeutil.IntToBool(isSecure),
|
|
IsHTTPOnly: typeutil.IntToBool(isHTTPOnly),
|
|
HasExpire: typeutil.IntToBool(hasExpire),
|
|
IsPersistent: typeutil.IntToBool(isPersistent),
|
|
CreateDate: typeutil.TimeEpoch(createDate),
|
|
ExpireDate: typeutil.TimeEpoch(expireDate),
|
|
}
|
|
if len(encryptValue) > 0 {
|
|
if len(masterKey) == 0 {
|
|
value, err = crypto.DPAPI(encryptValue)
|
|
} else {
|
|
value, err = crypto.DecryptPass(masterKey, encryptValue)
|
|
}
|
|
if err != nil {
|
|
slog.Error("decrypt chromium cookie error", "err", err)
|
|
}
|
|
}
|
|
cookie.Value = string(value)
|
|
*c = append(*c, cookie)
|
|
}
|
|
sort.Slice(*c, func(i, j int) bool {
|
|
return (*c)[i].CreateDate.After((*c)[j].CreateDate)
|
|
})
|
|
return nil
|
|
}
|
|
|
|
func (c *ChromiumCookie) Name() string {
|
|
return "cookie"
|
|
}
|
|
|
|
func (c *ChromiumCookie) Len() int {
|
|
return len(*c)
|
|
}
|
|
|
|
type FirefoxCookie []cookie
|
|
|
|
const (
|
|
queryFirefoxCookie = `SELECT name, value, host, path, creationTime, expiry, isSecure, isHttpOnly FROM moz_cookies`
|
|
)
|
|
|
|
func (f *FirefoxCookie) Parse(_ []byte) error {
|
|
db, err := sql.Open("sqlite3", item.FirefoxCookie.TempFilename())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer os.Remove(item.FirefoxCookie.TempFilename())
|
|
defer db.Close()
|
|
|
|
rows, err := db.Query(queryFirefoxCookie)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer rows.Close()
|
|
for rows.Next() {
|
|
var (
|
|
name, value, host, path string
|
|
isSecure, isHTTPOnly int
|
|
creationTime, expiry int64
|
|
)
|
|
if err = rows.Scan(&name, &value, &host, &path, &creationTime, &expiry, &isSecure, &isHTTPOnly); err != nil {
|
|
slog.Error("scan firefox cookie error", "err", err)
|
|
}
|
|
*f = append(*f, cookie{
|
|
KeyName: name,
|
|
Host: host,
|
|
Path: path,
|
|
IsSecure: typeutil.IntToBool(isSecure),
|
|
IsHTTPOnly: typeutil.IntToBool(isHTTPOnly),
|
|
CreateDate: typeutil.TimeStamp(creationTime / 1000000),
|
|
ExpireDate: typeutil.TimeStamp(expiry),
|
|
Value: value,
|
|
})
|
|
}
|
|
|
|
sort.Slice(*f, func(i, j int) bool {
|
|
return (*f)[i].CreateDate.After((*f)[j].CreateDate)
|
|
})
|
|
return nil
|
|
}
|
|
|
|
func (f *FirefoxCookie) Name() string {
|
|
return "cookie"
|
|
}
|
|
|
|
func (f *FirefoxCookie) Len() int {
|
|
return len(*f)
|
|
}
|