try to understand key in ntlm
This commit is contained in:
@@ -123,11 +123,13 @@ def encodeDERTRequest(negoTypes):
|
||||
def decodeDERTRequest(s):
|
||||
"""
|
||||
@summary: Decode the stream as
|
||||
@param s: {Stream}
|
||||
@param s: ([{Stream}], {str} pubKeyAuth)
|
||||
"""
|
||||
tRequest = decoder.decode(s.getvalue(), asn1Spec=TSRequest())[0]
|
||||
return decoder.decode(s.getvalue(), asn1Spec=TSRequest())[0]
|
||||
|
||||
def getNegoTokens(tRequest):
|
||||
negoData = tRequest.getComponentByName("negoTokens")
|
||||
return [Stream(negoData.getComponentByPosition(i).getComponentByPosition(0).asOctets()) for i in range(len(negoData))]
|
||||
|
||||
result = [Stream(negoData.getComponentByPosition(i).getComponentByPosition(0).asOctets()) for i in range(len(negoData))]
|
||||
|
||||
return result
|
||||
def getPubKeyAuth(tRequest):
|
||||
return tRequest.getComponentByName("pubKeyAuth").asOctets()
|
||||
@@ -24,6 +24,7 @@
|
||||
|
||||
import hashlib, hmac
|
||||
import rdpy.security.pyDes as pyDes
|
||||
import rdpy.security.rc4 as rc4
|
||||
from rdpy.security.rsa_wrapper import random
|
||||
from rdpy.core.type import CompositeType, CallableValue, String, UInt8, UInt16Le, UInt24Le, UInt32Le, sizeof
|
||||
|
||||
@@ -76,6 +77,14 @@ class Negotiate(object):
|
||||
NTLMSSP_REQUEST_TARGET = 0x00000004
|
||||
NTLM_NEGOTIATE_OEM = 0x00000002
|
||||
NTLMSSP_NEGOTIATE_UNICODE = 0x00000001
|
||||
|
||||
def getPayLoadField(message, length, bufferOffset):
|
||||
if length == 0:
|
||||
return None
|
||||
offset = sizeof(message) - sizeof(message.Payload)
|
||||
start = bufferOffset - offset
|
||||
end = start + length
|
||||
return message.Payload.value[start:end]
|
||||
|
||||
class Version(CompositeType):
|
||||
"""
|
||||
@@ -150,20 +159,10 @@ class ChallengeMessage(CompositeType):
|
||||
self.Payload = String()
|
||||
|
||||
def getTargetName(self):
|
||||
if self.TargetNameLen.value == 0:
|
||||
return None
|
||||
offset = sizeof(self) - sizeof(self.Payload)
|
||||
start = self.TargetNameBufferOffset.value - offset
|
||||
end = start + self.TargetNameLen.value
|
||||
return self.Payload.value[start:end]
|
||||
return getPayLoadField(self, self.TargetNameLen.value, self.TargetNameBufferOffset.value)
|
||||
|
||||
def getTargetInfo(self):
|
||||
if self.TargetInfoLen.value == 0:
|
||||
return None
|
||||
offset = sizeof(self) - sizeof(self.Payload)
|
||||
start = self.TargetInfoBufferOffset.value - offset
|
||||
end = start + self.TargetInfoLen.value - 4
|
||||
return self.Payload.value[start:end]
|
||||
return getPayLoadField(self, self.TargetInfoLen.value - 4, self.TargetInfoBufferOffset.value)
|
||||
|
||||
class AuthenticateMessage(CompositeType):
|
||||
"""
|
||||
@@ -206,20 +205,19 @@ class AuthenticateMessage(CompositeType):
|
||||
self.Payload = String()
|
||||
|
||||
def getUserName(self):
|
||||
if self.UserNameLen.value == 0:
|
||||
return None
|
||||
offset = sizeof(self) - sizeof(self.Payload)
|
||||
start = self.UserNameBufferOffset.value - offset
|
||||
end = start + self.UserNameLen.value
|
||||
return self.Payload.value[start:end]
|
||||
return getPayLoadField(self, self.UserNameLen.value, self.UserNameBufferOffset.value)
|
||||
|
||||
def getDomainName(self):
|
||||
if self.DomainNameLen.value == 0:
|
||||
return None
|
||||
offset = sizeof(self) - sizeof(self.Payload)
|
||||
start = self.DomainNameBufferOffset.value - offset
|
||||
end = start + self.DomainNameLen.value
|
||||
return self.Payload.value[start:end]
|
||||
return getPayLoadField(self, self.DomainNameLen.value, self.DomainNameBufferOffset.value)
|
||||
|
||||
def getLmChallengeResponse(self):
|
||||
return getPayLoadField(self, self.LmChallengeResponseLen.value, self.LmChallengeResponseBufferOffset.value)
|
||||
|
||||
def getNtChallengeResponse(self):
|
||||
return getPayLoadField(self, self.NtChallengeResponseLen.value, self.NtChallengeResponseBufferOffset.value)
|
||||
|
||||
def getEncryptedRandomSession(self):
|
||||
return getPayLoadField(self, self.EncryptedRandomSessionLen.value, self.EncryptedRandomSessionBufferOffset.value)
|
||||
|
||||
def expandDesKey(key):
|
||||
"""
|
||||
@@ -281,6 +279,25 @@ def Z(m):
|
||||
@return: \x00 * m
|
||||
"""
|
||||
return "\x00" * m
|
||||
|
||||
def RC4K(key, plaintext):
|
||||
"""
|
||||
@summary: Context free of rc4 encoding
|
||||
@param key: {str} key
|
||||
@param plaintext: {str} plaintext
|
||||
@return {str} encrypted text
|
||||
"""
|
||||
return rc4.crypt(rc4.RC4Key(key), plaintext)
|
||||
|
||||
def KXKEY(SessionBaseKey, LmChallengeResponse, ServerChallenge):
|
||||
"""
|
||||
@summary: Key eXchange Key
|
||||
@param SessionBaseKey: {str} computed by NTLMv1Anthentication or NTLMv2Authenticate function
|
||||
@param LmChallengeResponse : {str} computed by NTLMv1Anthentication or NTLMv2Authenticate function
|
||||
@param ServerChallenge : {str} Server chanllenge come from ChallengeMessage
|
||||
@see: https://msdn.microsoft.com/en-us/library/cc236710.aspx
|
||||
"""
|
||||
return HMAC_MD5(SessionBaseKey, ServerChallenge + LmChallengeResponse[:8])
|
||||
|
||||
def NTOWFv1(Passwd, User, UserDom):
|
||||
"""
|
||||
@@ -328,7 +345,7 @@ def NTOWFv2(Passwd, User, UserDom):
|
||||
def LMOWFv2(Passwd, User, UserDom):
|
||||
return NTOWFv2(Passwd, User, UserDom)
|
||||
|
||||
def NTLMv2Authenticate(negFlag, domain, user, password, serverChallenge, serverName):
|
||||
def NTLMv2Authenticate(negFlag, domain, user, password, serverChallenge, serverName, Time = "\x00" * 8, ClientChallenge = None):
|
||||
"""
|
||||
@summary: process NTLMv2 Authenticate hash
|
||||
@see: https://msdn.microsoft.com/en-us/library/cc236700.aspx
|
||||
@@ -336,10 +353,11 @@ def NTLMv2Authenticate(negFlag, domain, user, password, serverChallenge, serverN
|
||||
ResponseKeyNT = NTOWFv2(password, user, domain)
|
||||
ResponseKeyLM = LMOWFv2(password, user, domain)
|
||||
|
||||
Responserversion = "\0x01"
|
||||
HiResponserversion = "0x01"
|
||||
Time = "\x00" * 8
|
||||
ClientChallenge = random(64)
|
||||
Responserversion = "\x01"
|
||||
HiResponserversion = "\x01"
|
||||
#Time = "\x00" * 8
|
||||
if ClientChallenge is None:
|
||||
ClientChallenge = random(64)
|
||||
|
||||
temp = Responserversion + HiResponserversion + Z(6) + Time + ClientChallenge + Z(4) + serverName + Z(4)
|
||||
NTProofStr = HMAC_MD5(ResponseKeyNT, serverChallenge + temp)
|
||||
@@ -392,4 +410,190 @@ def createAuthenticationMessage(method, challengeResponse, domain, user, passwor
|
||||
message.Payload.value += SessionBaseKey
|
||||
offset += len(SessionBaseKey)
|
||||
|
||||
return message
|
||||
return message
|
||||
|
||||
|
||||
cssp_1 = [
|
||||
0x30, 0x2f, 0xa0, 0x03, 0x02, 0x01, 0x02, 0xa1,
|
||||
0x28, 0x30, 0x26, 0x30, 0x24, 0xa0, 0x22, 0x04,
|
||||
0x20, 0x4e, 0x54, 0x4c, 0x4d, 0x53, 0x53, 0x50,
|
||||
0x00, 0x01, 0x00, 0x00, 0x00, 0x35, 0x82, 0x08,
|
||||
0x60, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00 ]
|
||||
cssp_2 = [
|
||||
0x30, 0x82, 0x01, 0x09, 0xa0, 0x03, 0x02, 0x01,
|
||||
0x02, 0xa1, 0x82, 0x01, 0x00, 0x30, 0x81, 0xfd,
|
||||
0x30, 0x81, 0xfa, 0xa0, 0x81, 0xf7, 0x04, 0x81,
|
||||
0xf4, 0x4e, 0x54, 0x4c, 0x4d, 0x53, 0x53, 0x50,
|
||||
0x00, 0x02, 0x00, 0x00, 0x00, 0x0e, 0x00, 0x0e,
|
||||
0x00, 0x38, 0x00, 0x00, 0x00, 0x35, 0x82, 0x89,
|
||||
0x62, 0x73, 0xc7, 0x43, 0xa9, 0xe7, 0xfc, 0xbb,
|
||||
0xfc, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0xae, 0x00, 0xae, 0x00, 0x46, 0x00, 0x00,
|
||||
0x00, 0x06, 0x01, 0xb1, 0x1d, 0x00, 0x00, 0x00,
|
||||
0x0f, 0x53, 0x00, 0x49, 0x00, 0x52, 0x00, 0x41,
|
||||
0x00, 0x44, 0x00, 0x45, 0x00, 0x4c, 0x00, 0x02,
|
||||
0x00, 0x0e, 0x00, 0x53, 0x00, 0x49, 0x00, 0x52,
|
||||
0x00, 0x41, 0x00, 0x44, 0x00, 0x45, 0x00, 0x4c,
|
||||
0x00, 0x01, 0x00, 0x16, 0x00, 0x57, 0x00, 0x41,
|
||||
0x00, 0x56, 0x00, 0x2d, 0x00, 0x47, 0x00, 0x4c,
|
||||
0x00, 0x57, 0x00, 0x2d, 0x00, 0x30, 0x00, 0x30,
|
||||
0x00, 0x39, 0x00, 0x04, 0x00, 0x1a, 0x00, 0x53,
|
||||
0x00, 0x69, 0x00, 0x72, 0x00, 0x61, 0x00, 0x64,
|
||||
0x00, 0x65, 0x00, 0x6c, 0x00, 0x2e, 0x00, 0x6c,
|
||||
0x00, 0x6f, 0x00, 0x63, 0x00, 0x61, 0x00, 0x6c,
|
||||
0x00, 0x03, 0x00, 0x32, 0x00, 0x77, 0x00, 0x61,
|
||||
0x00, 0x76, 0x00, 0x2d, 0x00, 0x67, 0x00, 0x6c,
|
||||
0x00, 0x77, 0x00, 0x2d, 0x00, 0x30, 0x00, 0x30,
|
||||
0x00, 0x39, 0x00, 0x2e, 0x00, 0x53, 0x00, 0x69,
|
||||
0x00, 0x72, 0x00, 0x61, 0x00, 0x64, 0x00, 0x65,
|
||||
0x00, 0x6c, 0x00, 0x2e, 0x00, 0x6c, 0x00, 0x6f,
|
||||
0x00, 0x63, 0x00, 0x61, 0x00, 0x6c, 0x00, 0x05,
|
||||
0x00, 0x1a, 0x00, 0x53, 0x00, 0x69, 0x00, 0x72,
|
||||
0x00, 0x61, 0x00, 0x64, 0x00, 0x65, 0x00, 0x6c,
|
||||
0x00, 0x2e, 0x00, 0x6c, 0x00, 0x6f, 0x00, 0x63,
|
||||
0x00, 0x61, 0x00, 0x6c, 0x00, 0x07, 0x00, 0x08,
|
||||
0x00, 0x56, 0x93, 0x34, 0x32, 0xc7, 0x55, 0xd0,
|
||||
0x01, 0x00, 0x00, 0x00, 0x00 ]
|
||||
cssp_3 = [
|
||||
0x30, 0x82, 0x02, 0x0f, 0xa0, 0x03, 0x02, 0x01,
|
||||
0x02, 0xa1, 0x82, 0x01, 0x62, 0x30, 0x82, 0x01,
|
||||
0x5e, 0x30, 0x82, 0x01, 0x5a, 0xa0, 0x82, 0x01,
|
||||
0x56, 0x04, 0x82, 0x01, 0x52, 0x4e, 0x54, 0x4c,
|
||||
0x4d, 0x53, 0x53, 0x50, 0x00, 0x03, 0x00, 0x00,
|
||||
0x00, 0x18, 0x00, 0x18, 0x00, 0x50, 0x00, 0x00,
|
||||
0x00, 0xda, 0x00, 0xda, 0x00, 0x68, 0x00, 0x00,
|
||||
0x00, 0x08, 0x00, 0x08, 0x00, 0x40, 0x00, 0x00,
|
||||
0x00, 0x08, 0x00, 0x08, 0x00, 0x48, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x50, 0x00, 0x00,
|
||||
0x00, 0x10, 0x00, 0x10, 0x00, 0x42, 0x01, 0x00,
|
||||
0x00, 0x35, 0x82, 0x08, 0x60, 0x63, 0x00, 0x6f,
|
||||
0x00, 0x63, 0x00, 0x6f, 0x00, 0x74, 0x00, 0x6f,
|
||||
0x00, 0x74, 0x00, 0x6f, 0x00, 0x1a, 0x8a, 0xc2,
|
||||
0xbc, 0x64, 0xda, 0xc0, 0x28, 0x9b, 0xa8, 0x14,
|
||||
0x08, 0x51, 0x6d, 0xd6, 0xb8, 0x29, 0x09, 0xd2,
|
||||
0x99, 0x19, 0x33, 0x70, 0x9e, 0x51, 0xa0, 0x6e,
|
||||
0xc5, 0x39, 0x47, 0xf3, 0x9e, 0x96, 0x6a, 0xc3,
|
||||
0xfc, 0xb2, 0xeb, 0xc7, 0xe0, 0x01, 0x01, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x45, 0x08,
|
||||
0x32, 0xc7, 0x55, 0xd0, 0x01, 0x29, 0x09, 0xd2,
|
||||
0x99, 0x19, 0x33, 0x70, 0x9e, 0x00, 0x00, 0x00,
|
||||
0x00, 0x02, 0x00, 0x0e, 0x00, 0x53, 0x00, 0x49,
|
||||
0x00, 0x52, 0x00, 0x41, 0x00, 0x44, 0x00, 0x45,
|
||||
0x00, 0x4c, 0x00, 0x01, 0x00, 0x16, 0x00, 0x57,
|
||||
0x00, 0x41, 0x00, 0x56, 0x00, 0x2d, 0x00, 0x47,
|
||||
0x00, 0x4c, 0x00, 0x57, 0x00, 0x2d, 0x00, 0x30,
|
||||
0x00, 0x30, 0x00, 0x39, 0x00, 0x04, 0x00, 0x1a,
|
||||
0x00, 0x53, 0x00, 0x69, 0x00, 0x72, 0x00, 0x61,
|
||||
0x00, 0x64, 0x00, 0x65, 0x00, 0x6c, 0x00, 0x2e,
|
||||
0x00, 0x6c, 0x00, 0x6f, 0x00, 0x63, 0x00, 0x61,
|
||||
0x00, 0x6c, 0x00, 0x03, 0x00, 0x32, 0x00, 0x77,
|
||||
0x00, 0x61, 0x00, 0x76, 0x00, 0x2d, 0x00, 0x67,
|
||||
0x00, 0x6c, 0x00, 0x77, 0x00, 0x2d, 0x00, 0x30,
|
||||
0x00, 0x30, 0x00, 0x39, 0x00, 0x2e, 0x00, 0x53,
|
||||
0x00, 0x69, 0x00, 0x72, 0x00, 0x61, 0x00, 0x64,
|
||||
0x00, 0x65, 0x00, 0x6c, 0x00, 0x2e, 0x00, 0x6c,
|
||||
0x00, 0x6f, 0x00, 0x63, 0x00, 0x61, 0x00, 0x6c,
|
||||
0x00, 0x05, 0x00, 0x1a, 0x00, 0x53, 0x00, 0x69,
|
||||
0x00, 0x72, 0x00, 0x61, 0x00, 0x64, 0x00, 0x65,
|
||||
0x00, 0x6c, 0x00, 0x2e, 0x00, 0x6c, 0x00, 0x6f,
|
||||
0x00, 0x63, 0x00, 0x61, 0x00, 0x6c, 0x00, 0x07,
|
||||
0x00, 0x08, 0x00, 0x56, 0x93, 0x34, 0x32, 0xc7,
|
||||
0x55, 0xd0, 0x01, 0x00, 0x00, 0x00, 0x00, 0xbf,
|
||||
0xec, 0xf5, 0xf6, 0x69, 0x01, 0x3a, 0xef, 0x5b,
|
||||
0xd0, 0xab, 0xfe, 0x3f, 0xdf, 0x75, 0x30, 0xa3,
|
||||
0x82, 0x00, 0xa0, 0x04, 0x82, 0x00, 0x9c, 0x01,
|
||||
0x00, 0x00, 0x00, 0xc4, 0x0e, 0xcd, 0x96, 0x8f,
|
||||
0x67, 0xc0, 0xdd, 0x00, 0x00, 0x00, 0x00, 0xcf,
|
||||
0x88, 0xbd, 0x30, 0xe2, 0x53, 0x4a, 0x4b, 0x8d,
|
||||
0x49, 0xd4, 0xe9, 0xa3, 0x63, 0x1f, 0xe8, 0x19,
|
||||
0x59, 0xe6, 0x88, 0x96, 0xaa, 0x50, 0x35, 0x81,
|
||||
0x02, 0x9a, 0x91, 0x25, 0x8b, 0x1c, 0x0f, 0x8f,
|
||||
0xc6, 0x91, 0x44, 0x55, 0x5f, 0x4e, 0xd9, 0x1b,
|
||||
0xc3, 0xae, 0x94, 0xde, 0x09, 0xa8, 0xdd, 0x80,
|
||||
0x64, 0x52, 0x85, 0x4a, 0xf2, 0xd7, 0xc7, 0x11,
|
||||
0x29, 0x22, 0xbe, 0xe5, 0xad, 0x57, 0x6b, 0x4f,
|
||||
0xdc, 0xa1, 0xae, 0x00, 0x5b, 0xff, 0xe8, 0x6c,
|
||||
0xdb, 0x15, 0x84, 0x18, 0x94, 0x0e, 0xeb, 0xcd,
|
||||
0x9d, 0x41, 0xc3, 0x4e, 0xf6, 0xa6, 0xcf, 0x2c,
|
||||
0xf5, 0xc5, 0x9e, 0xa0, 0xd9, 0x80, 0x5f, 0xaa,
|
||||
0x22, 0x66, 0x61, 0x56, 0xde, 0x3e, 0xcb, 0x5f,
|
||||
0x7c, 0x64, 0xaf, 0xbf, 0xa7, 0x26, 0x83, 0xa8,
|
||||
0x5c, 0x88, 0xf3, 0xbe, 0x8a, 0xe6, 0xe6, 0x4c,
|
||||
0xf7, 0x95, 0xd0, 0xa8, 0xf0, 0x8c, 0x21, 0xf8,
|
||||
0x86, 0x77, 0x49, 0x29, 0xe3, 0xd3, 0xf8, 0x78,
|
||||
0x1f, 0x51, 0x91 ]
|
||||
|
||||
pubKey = "\x30\x81\x89\x02\x81\x81\x00\x9e\x95\xb5\x41\x03\xc5\x33\xea\x29\x65\x2b\x65\xef\x30\x71\xdd\x73\xbb\x30\x3b\xec\xca\x72\xcf\xbd\xe0\xf8\x21\xff\xa6\x97\x76\xa1\x08\xb5\xd2\xc6\x95\x81\xd2\xba\x71\x10\x4a\xac\x25\x34\x37\xa0\xc3\x57\xf0\xea\x1f\x8c\x84\xeb\x7b\xe6\x6c\x50\x26\x1f\xb7\x41\x0a\x58\xd3\x80\x87\x3d\x0b\x41\xd9\xbc\x54\x3a\x0f\x77\x14\x79\xf5\xb9\xa4\x38\xeb\x13\x08\x35\xae\xbf\xb3\x17\x5a\xe2\x58\x89\x39\xc4\x22\x7f\x16\x57\x90\x08\xaf\x91\x3b\x95\xc8\x53\xd0\xc0\x8e\x19\x8a\xf3\x10\xbc\xc8\xc7\x42\xfb\x12\xde\x2d\x5e\x83\x02\x03\x01\x00\x01"
|
||||
|
||||
if __name__ == "__main__":
|
||||
import cssp, hexdump
|
||||
from rdpy.core.type import Stream
|
||||
|
||||
negotiate_data_request = cssp.decodeDERTRequest(Stream("".join([chr(i) for i in cssp_1])))
|
||||
challenge_data_request = cssp.decodeDERTRequest(Stream("".join([chr(i) for i in cssp_2])))
|
||||
authenticate_data_request = cssp.decodeDERTRequest(Stream("".join([chr(i) for i in cssp_3])))
|
||||
|
||||
negotiate_data = cssp.getNegoTokens(negotiate_data_request)[0]
|
||||
challenge_data = cssp.getNegoTokens(challenge_data_request)[0]
|
||||
authenticate_data = cssp.getNegoTokens(authenticate_data_request)[0]
|
||||
|
||||
negotiate = NegotiateMessage()
|
||||
negotiate_data.readType(negotiate)
|
||||
|
||||
challenge = ChallengeMessage()
|
||||
challenge_data.readType(challenge)
|
||||
|
||||
ServerChallenge = challenge.ServerChallenge.value
|
||||
ServerName = challenge.getTargetInfo()
|
||||
|
||||
authenticate = AuthenticateMessage()
|
||||
authenticate_data.readType(authenticate)
|
||||
|
||||
NtChallengeResponse = authenticate.getNtChallengeResponse()
|
||||
NTProofStr = NtChallengeResponse[:16]
|
||||
temp = NtChallengeResponse[16:]
|
||||
Time = temp[8:16]
|
||||
ClientChallenge = temp[16:24]
|
||||
ServerName2 = temp[28:-4]
|
||||
|
||||
LmChallengeResponse = authenticate.getLmChallengeResponse()
|
||||
SessionBaseKey = authenticate.getEncryptedRandomSession()
|
||||
encryptedPubKey = cssp.getPubKeyAuth(authenticate_data_request)
|
||||
|
||||
NtChallengeResponse2, LmChallengeResponse2, SessionBaseKey2 = NTLMv2Authenticate(None, "coco", "toto", "lolo", ServerChallenge, ServerName, Time, ClientChallenge)
|
||||
|
||||
KeyExchangeKey = HMAC_MD5(SessionBaseKey2, ServerChallenge + LmChallengeResponse[:7])
|
||||
ExportedSessionKey = RC4K(KeyExchangeKey, SessionBaseKey)
|
||||
sealingKey = MD5(ExportedSessionKey + "session key to client-to-server sealing key magic constant")
|
||||
#sealingKey = MD5(sealingKey + "\x00" + "\x00" * 3)
|
||||
|
||||
encryptedPubKey2 = RC4K(sealingKey, pubKey)
|
||||
|
||||
hexdump.hexdump(encryptedPubKey)
|
||||
print "\n"
|
||||
hexdump.hexdump(encryptedPubKey2)
|
||||
print "-"*40
|
||||
print "NtChallengeResponse"
|
||||
print "\n"
|
||||
hexdump.hexdump(NtChallengeResponse)
|
||||
print "\n"
|
||||
hexdump.hexdump(NtChallengeResponse2)
|
||||
print "-"*40
|
||||
|
||||
print "-"*40
|
||||
print "LmChallengeResponse"
|
||||
print "\n"
|
||||
hexdump.hexdump(LmChallengeResponse)
|
||||
print "\n"
|
||||
hexdump.hexdump(LmChallengeResponse2)
|
||||
print "-"*40
|
||||
|
||||
print "-"*40
|
||||
print "SessionBaseKey"
|
||||
print "\n"
|
||||
hexdump.hexdump(SessionBaseKey)
|
||||
print "\n"
|
||||
hexdump.hexdump(SessionBaseKey2)
|
||||
print "-"*40
|
||||
Reference in New Issue
Block a user