解密Chromium Cookie [英] Decrypting Chromium cookies
问题描述
我尝试在Python中使用Chromium Cookie,因为Chromium使用AES(使用CBC)加密其Cookie,我需要扭转这个问题。
I'm trying to use Chromium cookies in Python, because Chromium encrypts its cookies using AES (with CBC) I need to reverse this.
来自OS X的Keychain的AES密钥(存储在Base 64中):
I can recover the AES key from OS X's Keychain (it's stored in Base 64):
security find-generic-password -w -a Chrome -s Chrome Safe Storage
# From Python:
python -c 'from subprocess import PIPE, Popen; print(Popen(['security', 'find-generic-password', '-w', '-a', 'Chrome', '-s', 'Chrome Safe Storage'], stdout=PIPE).stdout.read().strip())'
这是代码我有,解密cookie:
Here's the code I have, all I'm missing is decrypting the cookies:
from subprocess import PIPE, Popen
from sqlite3 import dbapi2
def get_encryption_key():
cmd = ['security', 'find-generic-password', '-w', '-a', 'Chrome', '-s', 'Chrome Safe Storage']
return Popen(cmd, stdout=PIPE).stdout.read().strip().decode('base-64')
def get_cookies(database):
key = get_encryption_key()
with dbapi2.connect(database) as conn:
conn.rollback()
rows = conn.cursor().execute('SELECT name, encrypted_value FROM cookies WHERE host_key like ".example.com"')
cookies = {}
for name, enc_val in rows:
val = decrypt(enc_val, key) # magic missing
cookies[name] = val
return cookies
的 pyCrypto的AES模块,但
- 我没有初始化向量(IV)
-
enc_val
长度
- I have no Initialization Vector (IV)
enc_val
is not a multiple of 16 in length
以下是一些似乎有用的链接:
Here are some links that seem useful:
- the commit that started it all
- components/encryptor/keychain_password_mac.mm
- AES key generation (not used in OS X but could help someone else)
- cookie insertion function
您能帮我解决这个问题吗?
Can you help me figure this out?
推荐答案
你在正确的轨道上!我一直在这工作了几天,终于弄清楚了。 (非常感谢OP提供Chromium来源的实用链接。)
You're on the right track! I've been working on this for a few days and finally figured it out. (Many thanks to the OP for the helpful links to the Chromium source.)
我已经安装了 post有更多的细节和一个工作脚本,但这里是基本的想法:
I've put up a post with a little more detail and a working script, but here is the basic idea:
#! /usr/bin/env python3
from Crypto.Cipher import AES
from Crypto.Protocol.KDF import PBKDF2
# Function to get rid of padding
def clean(x):
return x[:-x[-1]].decode('utf8')
# replace with your encrypted_value from sqlite3
encrypted_value = ENCRYPTED_VALUE
# Trim off the 'v10' that Chrome/ium prepends
encrypted_value = encrypted_value[3:]
# Default values used by both Chrome and Chromium in OSX and Linux
salt = b'saltysalt'
iv = b' ' * 16
length = 16
# On Mac, replace MY_PASS with your password from Keychain
# On Linux, replace MY_PASS with 'peanuts'
my_pass = MY_PASS
my_pass = my_pass.encode('utf8')
# 1003 on Mac, 1 on Linux
iterations = 1003
key = PBKDF2(my_pass, salt, length, iterations)
cipher = AES.new(key, AES.MODE_CBC, IV=iv)
decrypted = cipher.decrypt(encrypted_value)
print(clean(decrypted))
这篇关于解密Chromium Cookie的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!