def handle(self):
        global email
        global password

        conn = challenge34_shared.Conn(self)

        print('S: reading email...')
        readEmail = conn.readline()

        print('S: reading A...')
        A = conn.readnum()

        print('S: writing salt...')
        conn.writenum(salt)

        b = random.randint(0, N)
        B = (pow(g, b, N) + k*v) % N

        print('S: writing B...')
        conn.writenum(B)

        u = challenge36_util.hashToInt(str(A) + str(B))

        S = pow(pow(v, u, N) * A, b, N)
        K = challenge36_util.hashToBytes(str(S))
        server_hmac = challenge36_util.hmac(salt, K)

        print('S: reading hmac...')
        client_hmac = conn.readbytes()

        if client_hmac == server_hmac:
            print('S: writing success...')
            conn.writeline(b'OK')
        else:
            conn.writeline(b'NOT OK')
    def handle(self):
        global email
        global password

        util = challenge34_util.Util(self)

        print('S: reading email...')
        readEmail = util.readline()

        print('S: reading A...')
        A = util.readnum()

        print('S: writing salt...')
        util.writenum(salt)

        b = random.randint(0, N)
        B = (pow(g, b, N) + k*v) % N

        print('S: writing B...')
        util.writenum(B)

        u = challenge36_util.hashToInt(str(A) + str(B))

        S = pow(pow(v, u, N) * A, b, N)
        K = challenge36_util.hashToBytes(str(S))
        server_hmac = challenge36_util.hmac(salt, K)

        print('S: reading hmac...')
        client_hmac = util.readbytes()

        if client_hmac == server_hmac:
            print('S: writing success...')
            util.writeline(b'OK')
        else:
            util.writeline(b'NOT OK')
    def handle(self):
        global email
        global password

        util = challenge34_util.Util(self)

        print('S: reading email...')
        readEmail = util.readline()

        print('S: reading A...')
        A = util.readnum()

        print('S: writing salt...')
        util.writenum(salt)

        b = random.randint(0, N)
        B = pow(g, b, N)

        print('S: writing B...')
        util.writenum(B)

        u = random.getrandbits(128)

        print('S: writing u...')
        util.writenum(u)

        S = pow(pow(v, u, N) * A, b, N)
        K = challenge36_util.hashToBytes(str(S))
        server_hmac = challenge36_util.hmac(salt, K)

        print('S: reading hmac...')
        client_hmac = util.readbytes()

        if client_hmac == server_hmac:
            print('S: writing success...')
            util.writeline(b'OK')
        else:
            util.writeline(b'NOT OK')
Exemple #4
0
    sock.connect((host, port))
    util = challenge34_util.Util(sock)

    print('C: writing email...')
    util.writeline(email.encode('ascii'))

    A = m*N
    print('C: writing A...')
    util.writenum(A)

    print('C: reading salt...')
    salt = util.readnum()

    print('C: reading B...')
    B = util.readnum()

    S = 0
    K = challenge36_util.hashToBytes(str(S))

    client_hmac = challenge36_util.hmac(salt, K)

    print('C: writing hmac...')
    util.writebytes(client_hmac)

    print('C: reading result...')
    result = util.readline()

    print('result:', result)
finally:
    sock.close()
Exemple #5
0
    util.writeline(email.encode('ascii'))

    print('C: writing A...')
    util.writenum(A)

    print('C: reading salt...')
    salt = util.readnum()

    print('C: reading B...')
    B = util.readnum()

    print('C: reading u...')
    u = util.readnum()

    x = challenge36_util.hashToInt(str(salt) + password)
    S = pow(B, a + u * x, N)

    K = challenge36_util.hashToBytes(str(S))

    client_hmac = challenge36_util.hmac(salt, K)

    print('C: writing hmac...')
    util.writebytes(client_hmac)

    print('C: reading result...')
    result = util.readline()

    print('result:', result)
finally:
    sock.close()
Exemple #6
0
N = 0xffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a431b302b0a6df25f14374fe1356d6d51c245e485b576625e7ec6f44c42e9a637ed6b0bff5cb6f406b7edee386bfb5a899fa5ae9f24117c4b1fe649286651ece45b3dc2007cb8a163bf0598da48361c55d39a69163fa8fd24cf5f83655d23dca3ad961c62f356208552bb9ed529077096966d670c354e4abc9804f1746c08ca237327ffffffffffffffff
g = 2
k = 3

b = 5
B = pow(g, b, N)
u = 1
salt = 0

if __name__ == "__main__":
    A = int(sys.argv[1])
    client_hmac = base64.b64decode(sys.argv[2])

    words = open('/usr/share/dict/words').readlines()
    l = ''
    for w in words:
        w = w.strip().lower()
        if w[0] != l:
            l = w[0]
            print(l + '...')
        x = challenge36_util.hashToInt(str(salt) + w)
        v = pow(g, x, N)
        S = pow(pow(v, u, N) * A, b, N)
        K = challenge36_util.hashToBytes(str(S))
        server_hmac = challenge36_util.hmac(salt, K)
        if client_hmac == server_hmac:
            print('password:'******'Could not crack password')
N = 0xffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a431b302b0a6df25f14374fe1356d6d51c245e485b576625e7ec6f44c42e9a637ed6b0bff5cb6f406b7edee386bfb5a899fa5ae9f24117c4b1fe649286651ece45b3dc2007cb8a163bf0598da48361c55d39a69163fa8fd24cf5f83655d23dca3ad961c62f356208552bb9ed529077096966d670c354e4abc9804f1746c08ca237327ffffffffffffffff
g = 2
k = 3

b = 5
B = pow(g, b, N)
u = 1
salt = 0

if __name__ == "__main__":
    A = int(sys.argv[1])
    client_hmac = base64.b64decode(sys.argv[2])

    words = open('/usr/share/dict/words').readlines()
    l = ''
    for w in words:
        w = w.strip().lower()
        if w[0] != l:
            l = w[0]
            print(l + '...')
        x = challenge36_util.hashToInt(str(salt) + w)
        v = pow(g, x, N)
        S = pow(pow(v, u, N) * A, b, N)
        K = challenge36_util.hashToBytes(str(S))
        server_hmac = challenge36_util.hmac(salt, K)
        if client_hmac == server_hmac:
            print('password:'******'Could not crack password')