text
stringlengths 1
93.6k
|
|---|
import optparse, os
|
from Registry.Registry import Registry
|
def check_parameters(options, args):
|
"""Simple checks on the parameters set by the user."""
|
if not args or len(args) != 1:
|
if os.path.exists(os.path.join('Windows','System32','config','SOFTWARE')): args.append(os.path.join('Windows','System32','config','SOFTWARE'))
|
else: exit('[-] Cannot parse anything without SOFTWARE hive.')
|
def reverseByte(bByteInput):
|
sReversed = ''
|
sHexInput = bByteInput.hex()
|
for x in range(-1, -len(str(sHexInput)), -2): sReversed += sHexInput[x-1] + sHexInput[x]
|
return bytes.fromhex(sReversed)
|
def parseFinalData(bData, boolVerbose = False):
|
sType = reverseByte(bData[:4])
|
iEncDataLen = int(reverseByte(bData[4:8]).hex(),16)
|
iIVLen = int(reverseByte(bData[8:12]).hex(), 16)
|
iEncPwdLen = int(reverseByte(bData[12:16]).hex(), 16)
|
iLastLen = int(reverseByte(bData[16:20]).hex(), 16)
|
iOffset = 20
|
sEncData = bData[iOffset:iOffset + iEncDataLen].hex()
|
iOffset += iEncDataLen
|
sIV = bData[iOffset:iOffset + iIVLen].hex()
|
iOffset += iIVLen
|
sEncPwd = bData[iOffset:iOffset + iEncPwdLen].hex()
|
iOffset += iEncPwdLen
|
sLast = bData[iOffset:iOffset + iLastLen].hex()
|
if boolVerbose:
|
print('[+] EncData : ' + sEncData)
|
print('[+] IV : ' + sIV)
|
print('[+] EncPassword : ' + sEncPwd)
|
return (sEncData, sIV, sEncPwd)
|
def main(sSOFTWARE, boolOutput = True):
|
oReg = Registry(open(sSOFTWARE, 'rb'))
|
try: oKey = oReg.open('Microsoft\\Windows\\CurrentVersion\\Authentication\\LogonUI\\NgcPin\\Credentials')
|
except:
|
if boolOutput: print('[-] No NGC data found in {}'.format(sSOFTWARE))
|
return []
|
arrSIDs = []
|
for oSubKey in oKey.subkeys():
|
sSID = oSubKey.name()
|
bData = oSubKey.value('EncryptedPassword').value()
|
arrSIDs.append((sSID, bData))
|
if boolOutput: print('[+] Found ' + str(len(arrSIDs)) + ' stored NgcPin Password(s) in the registry :\n')
|
oKey = oReg.open('Microsoft\\Windows\\CurrentVersion\\Authentication\\Credential Providers\\{D6886603-9D2F-4EB2-B667-1971041FA96B}')
|
arrUsers = []
|
for oSubKey in oKey.subkeys():
|
for oItem in arrSIDs:
|
if oItem[0] == oSubKey.name():
|
sUsername = oSubKey.subkey('UserNames').subkeys()[0].name()
|
if boolOutput:
|
print('[+] SID : ' + oItem[0])
|
print('[+] Username : ' + sUsername)
|
arrUserData = parseFinalData(oItem[1], boolOutput)
|
arrUsers.append((oItem[0], sUsername, arrUserData))
|
if boolOutput: print('=' * 20)
|
return arrUsers
|
if __name__ == '__main__':
|
"""Utility core."""
|
usage = (
|
'usage: %prog SOFTWARE_hive\n\n'
|
'It tries to decrypt Parse NgcPin from SOFTWARE Registry.\n'
|
'Needs the software hive\n')
|
parser = optparse.OptionParser(usage=usage)
|
(options, args) = parser.parse_args()
|
check_parameters(options, args)
|
main(args[0])
|
# <FILESEP>
|
"""
|
Demo that takes an iNaturalist taxa ID as input and generates a prediction
|
for each location on the globe and saves the ouput as an image.
|
"""
|
import torch
|
import numpy as np
|
import matplotlib.pyplot as plt
|
import os
|
import json
|
import argparse
|
import utils
|
import models
|
import datasets
|
def main(eval_params):
|
# load params
|
with open('paths.json', 'r') as f:
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.