#!/usr/bin/python import textwrap,sys,struct,math,base64 def PrepareInjectionBlock(msg,keylen,appended): lenbit = (keylen+len(msg))*8 jumlahblok = int(math.ceil(float(lenbit+8) / float(896))) # Jumlah blok lenpadbit = (1024*jumlahblok) - 128 - lenbit msg = msg + '\x80' for i in range(0,lenpadbit/8-1): msg = msg + '\x00' binlen = bin(lenbit) paddedlen = binlen[2:].zfill(128) arrpad = split_len(paddedlen,8) for i in range(len(arrpad)): msg = msg + chr(int(arrpad[i], 2)) msg = msg + appended return msg def ByteToHex( byteStr ): xxd = '' for i in range(len(byteStr)): if i % 16 == 0: xxd = xxd + str(i).zfill(5) +": " xxd = xxd + "%02X " % ord (byteStr[i]) if i % 16 == 15: xxd = xxd + "\n" if i % 16 == 7: xxd += "- " if i % 128 == 127: xxd += "\n" return xxd.strip() def split_len(seq, length): return [seq[i:i+length] for i in range(0, len(seq), length)] def makeSHA512(hasharray): SHA512 = '' for i in range(0,8): hexstr = hex(hasharray[i]) panjanghex = len(hexstr) if hexstr[panjanghex-1] == 'L': hexstr = hexstr[:-1] hexstr = hexstr[2:] SHA512 = SHA512 + hexstr.zfill(16) return SHA512 # Fungsi dan Konstanta SHA-512 K = [0x428a2f98d728ae22,0x7137449123ef65cd,0xb5c0fbcfec4d3b2f,0xe9b5dba58189dbbc,0x3956c25bf348b538,0x59f111f1b605d019,0x923f82a4af194f9b,0xab1c5ed5da6d8118,0xd807aa98a3030242,0x12835b0145706fbe,0x243185be4ee4b28c,0x550c7dc3d5ffb4e2,0x72be5d74f27b896f,0x80deb1fe3b1696b1,0x9bdc06a725c71235,0xc19bf174cf692694,0xe49b69c19ef14ad2,0xefbe4786384f25e3,0x0fc19dc68b8cd5b5,0x240ca1cc77ac9c65,0x2de92c6f592b0275,0x4a7484aa6ea6e483,0x5cb0a9dcbd41fbd4,0x76f988da831153b5,0x983e5152ee66dfab,0xa831c66d2db43210,0xb00327c898fb213f,0xbf597fc7beef0ee4,0xc6e00bf33da88fc2,0xd5a79147930aa725,0x06ca6351e003826f,0x142929670a0e6e70,0x27b70a8546d22ffc,0x2e1b21385c26c926,0x4d2c6dfc5ac42aed,0x53380d139d95b3df,0x650a73548baf63de,0x766a0abb3c77b2a8,0x81c2c92e47edaee6,0x92722c851482353b,0xa2bfe8a14cf10364,0xa81a664bbc423001,0xc24b8b70d0f89791,0xc76c51a30654be30,0xd192e819d6ef5218,0xd69906245565a910,0xf40e35855771202a,0x106aa07032bbd1b8,0x19a4c116b8d2d0c8,0x1e376c085141ab53,0x2748774cdf8eeb99,0x34b0bcb5e19b48a8,0x391c0cb3c5c95a63,0x4ed8aa4ae3418acb,0x5b9cca4f7763e373,0x682e6ff3d6b2b8a3,0x748f82ee5defb2fc,0x78a5636f43172f60,0x84c87814a1f0ab72,0x8cc702081a6439ec,0x90befffa23631e28,0xa4506cebde82bde9,0xbef9a3f7b2c67915,0xc67178f2e372532b,0xca273eceea26619c,0xd186b8c721c0c207,0xeada7dd6cde0eb1e,0xf57d4f7fee6ed178,0x06f067aa72176fba,0x0a637dc5a2c898a6,0x113f9804bef90dae,0x1b710b35131c471b,0x28db77f523047d84,0x32caab7b40c72493,0x3c9ebe0a15c9bebc,0x431d67c49c100d4c,0x4cc5d4becb3e42b6,0x597f299cfc657e2a,0x5fcb6fab3ad6faec,0x6c44198c4a475817] def SHR(x,n): return ((x & 0xffffffffffffffff) >> n) & 0xffffffffffffffff def ROTR(x,n): return (SHR(x,n) | ( (x << (64-n)) & 0xffffffffffffffff ) ) & 0xffffffffffffffff def Ch(x,y,z): return ( (x & y) ^ (~x & z) ) & 0xffffffffffffffff def Maj(x,y,z): return ( (x & y) ^ (x & z) ^ (y & z) ) & 0xffffffffffffffff def SIGMA0(x): return (ROTR(x, 28) ^ ROTR(x,34) ^ ROTR(x,39)) & 0xffffffffffffffff def SIGMA1(x): return (ROTR(x, 14) ^ ROTR(x,18) ^ ROTR(x,41)) & 0xffffffffffffffff def sigma0(x): return (ROTR(x, 1) ^ ROTR(x,8) ^ SHR(x, 7)) & 0xffffffffffffffff def sigma1(x): return (ROTR(x,19) ^ ROTR(x,61) ^ SHR(x,6)) & 0xffffffffffffffff # Cek parameter if len(sys.argv) < 5: print sys.argv[0]+" [knownMAC] [knownData] [appendedText] [keyLen]" sys.exit(0) knownmac = sys.argv[1] knowndata = sys.argv[2] appended = sys.argv[3] keylen = int(sys.argv[4]) message = appended # Prepare Injection Blocks injection = PrepareInjectionBlock(knowndata,keylen,appended) print "Injection Data in Hex Format:" print ByteToHex(injection) print print "Injection Data in Base64 Encoded Format:" print base64.b64encode(injection) # Persiapkan blok message print print '#'*10 + " Original Message " + '#'*10 print ByteToHex(message) lenbit = len(message)*8 jumlahblok = int(math.ceil(float(lenbit+8) / float(896))) # Jumlah blok lenpadbit = (1024*jumlahblok) - 128 - lenbit message = message + '\x80' for i in range(0,lenpadbit/8-1): message = message + '\x00' print print '#'*10 + " 1st Padding " + '#'*10 print ByteToHex(message) keyblocks = int(math.ceil(float(keylen) / float(128))) # Number of key blocks binlen = bin(128*keyblocks*8+lenbit) # Khusus extender paddedlen = binlen[2:].zfill(128) arrpad = split_len(paddedlen,8) for i in range(len(arrpad)): message = message + chr(int(arrpad[i], 2)) print print '#'*10 + " Final Padded Blocks " + '#'*10 print ByteToHex(message) print print '#'*10 + " Words " + '#'*10 words = split_len(message,8) # Split into 64 bit-words (8-bytes / 32bit) for i in range(len(words)): if i % 16 == 0: print "\n## Block "+str(i/16) words[i] = words[i] print ByteToHex(words[i]) macbyte = split_len(knownmac,16) for i in range(0,len(macbyte)): macbyte[i] = int(macbyte[i],16) H0 = macbyte[0] H1 = macbyte[1] H2 = macbyte[2] H3 = macbyte[3] H4 = macbyte[4] H5 = macbyte[5] H6 = macbyte[6] H7 = macbyte[7] print print "#"*165 print "Initial Hash value : " + makeSHA512([H0,H1,H2,H3,H4,H5,H6,H7]) for i in range(0,len(words)/16): print print "Memproses Blok "+str(i) W = [0] * 80 for t in range(0,16): wt = words[i*16+t] W[t] = int(wt.encode('hex'),16) & 0xffffffffffffffff for t in range(16,80): W[t] = sigma1(W[t-2])+W[t-7]+sigma0(W[t-15])+W[t-16] a = H0 b = H1 c = H2 d = H3 e = H4 f = H5 g = H6 h = H7 for t in range(0,80): T1 = h + SIGMA1(e) + Ch(e,f,g) + K[t] + W[t] T2 = SIGMA0(a) + Maj(a,b,c) h = g g = f f = e e = d + T1 d = c c = b b = a a = T1 + T2 H0 = (H0 + a) & 0xffffffffffffffff H1 = (H1 + b) & 0xffffffffffffffff H2 = (H2 + c) & 0xffffffffffffffff H3 = (H3 + d) & 0xffffffffffffffff H4 = (H4 + e) & 0xffffffffffffffff H5 = (H5 + f) & 0xffffffffffffffff H6 = (H6 + g) & 0xffffffffffffffff H7 = (H7 + h) & 0xffffffffffffffff SHA512 = makeSHA512([H0,H1,H2,H3,H4,H5,H6,H7]) print "Intermediate SHA512 for block "+str(i)+" : "+SHA512