Codebeispiel zum Knacken des PHP-Kontokennworts HashPassword-Verschlüsselungsmethode

PHP中文网
Freigeben: 2023-02-28 22:28:01
Original
3157 Leute haben es durchsucht

PHP账号密码HashPassword加密方式破解代码实例

itoa64 = './0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz';
        if ($iteration_count_log2 < 4 || $iteration_count_log2 > 31)
            $iteration_count_log2 = 8;
        $this->iteration_count_log2 = $iteration_count_log2;

        $this->portable_hashes = $portable_hashes;

        $this->random_state = microtime();
        if (function_exists(&#39;getmypid&#39;))
            $this->random_state .= getmypid();
    }

    function get_random_bytes($count)
    {
        $output = &#39;&#39;;
        if (is_readable(&#39;/dev/urandom&#39;) &&
                ($fh = @fopen(&#39;/dev/urandom&#39;, &#39;rb&#39;)))
        {
            $output = fread($fh, $count);
            fclose($fh);
        }

        if (strlen($output) < $count)
        {
            $output = &#39;&#39;;
            for ($i = 0; $i < $count; $i += 16)
            {
                $this->random_state = md5(microtime() . $this->random_state);
                $output .=
                        pack(&#39;H*&#39;, md5($this->random_state));
            }
            $output = substr($output, 0, $count);
        }
        return $output;
    }

    function encode64($input, $count)
    {
        $output = &#39;&#39;;
        $i = 0;
        do
        {
            $value = ord($input[$i++]);
            $output .= $this->itoa64[$value & 0x3f];
            if ($i < $count)
                $value |= ord($input[$i]) << 8;
            $output .= $this->itoa64[($value >> 6) & 0x3f];
            if ($i++ >= $count)
                break;
            if ($i < $count)
                $value |= ord($input[$i]) << 16;
            $output .= $this->itoa64[($value >> 12) & 0x3f];
            if ($i++ >= $count)
                break;
            $output .= $this->itoa64[($value >> 18) & 0x3f];
        } while ($i < $count);

        return $output;
    }

    function gensalt_private($input)
    {
        $output = &#39;$P$&#39;;
        $output .= $this->itoa64[min($this->iteration_count_log2 +
                        ((PHP_VERSION >= &#39;5&#39;) ? 5 : 3), 30)];
        $output .= $this->encode64($input, 6);

        return $output;
    }

    function crypt_private($password, $setting)
    {
        $output = &#39;*0&#39;;
        if (substr($setting, 0, 2) == $output)
            $output = &#39;*1&#39;;

        $id = substr($setting, 0, 3);
        # We use "$P$", phpBB3 uses "$H$" for the same thing
        if ($id != &#39;$P$&#39; && $id != &#39;$H$&#39;)
            return $output;

        $count_log2 = strpos($this->itoa64, $setting[3]);
        if ($count_log2 < 7 || $count_log2 > 30)
            return $output;

        $count = 1 << $count_log2;

        $salt = substr($setting, 4, 8);
        if (strlen($salt) != 8)
            return $output;

        # We&#39;re kind of forced to use MD5 here since it&#39;s the only
        # cryptographic primitive available in all versions of PHP
        # currently in use.  To implement our own low-level crypto
        # in PHP would result in much worse performance and
        # consequently in lower iteration counts and hashes that are
        # quicker to crack (by non-PHP code).
        if (PHP_VERSION >= &#39;5&#39;)
        {
            $hash = md5($salt . $password, TRUE);
            do
            {
                $hash = md5($hash . $password, TRUE);
            } while (--$count);
        } else
        {
            $hash = pack(&#39;H*&#39;, md5($salt . $password));
            do
            {
                $hash = pack(&#39;H*&#39;, md5($hash . $password));
            } while (--$count);
        }

        $output = substr($setting, 0, 12);
        $output .= $this->encode64($hash, 16);

        return $output;
    }

    function gensalt_extended($input)
    {
        $count_log2 = min($this->iteration_count_log2 + 8, 24);
        # This should be odd to not reveal weak DES keys, and the
        # maximum valid value is (2**24 - 1) which is odd anyway.
        $count = (1 << $count_log2) - 1;

        $output = &#39;_&#39;;
        $output .= $this->itoa64[$count & 0x3f];
        $output .= $this->itoa64[($count >> 6) & 0x3f];
        $output .= $this->itoa64[($count >> 12) & 0x3f];
        $output .= $this->itoa64[($count >> 18) & 0x3f];

        $output .= $this->encode64($input, 3);

        return $output;
    }

    function gensalt_blowfish($input)
    {
        # This one needs to use a different order of characters and a
        # different encoding scheme from the one in encode64() above.
        # We care because the last character in our encoded string will
        # only represent 2 bits.  While two known implementations of
        # bcrypt will happily accept and correct a salt string which
        # has the 4 unused bits set to non-zero, we do not want to take
        # chances and we also do not want to waste an additional byte
        # of entropy.
        $itoa64 = &#39;./ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789&#39;;

        $output = &#39;$2a$&#39;;
        $output .= chr(ord(&#39;0&#39;) + $this->iteration_count_log2 / 10);
        $output .= chr(ord(&#39;0&#39;) + $this->iteration_count_log2 % 10);
        $output .= &#39;$&#39;;

        $i = 0;
        do
        {
            $c1 = ord($input[$i++]);
            $output .= $itoa64[$c1 >> 2];
            $c1 = ($c1 & 0x03) << 4;
            if ($i >= 16)
            {
                $output .= $itoa64[$c1];
                break;
            }

            $c2 = ord($input[$i++]);
            $c1 |= $c2 >> 4;
            $output .= $itoa64[$c1];
            $c1 = ($c2 & 0x0f) << 2;

            $c2 = ord($input[$i++]);
            $c1 |= $c2 >> 6;
            $output .= $itoa64[$c1];
            $output .= $itoa64[$c2 & 0x3f];
        } while (1);

        return $output;
    }

    function HashPassword($password)
    {
        $random = &#39;&#39;;

        if (CRYPT_BLOWFISH == 1 && !$this->portable_hashes)
        {
            $random = $this->get_random_bytes(16);
            $hash = crypt($password, $this->gensalt_blowfish($random));
            if (strlen($hash) == 60)
                return $hash;
        }

        if (CRYPT_EXT_DES == 1 && !$this->portable_hashes)
        {
            if (strlen($random) < 3)
                $random = $this->get_random_bytes(3);
            $hash = crypt($password, $this->gensalt_extended($random));
            if (strlen($hash) == 20)
                return $hash;
        }
        if (strlen($random) < 6)
            $random = $this->get_random_bytes(6);
        $hash = $this->crypt_private($password, $this->gensalt_private($random));
        if (strlen($hash) == 34)
            return $hash;

        # Returning &#39;*&#39; on error is safe here, but would _not_ be safe
        # in a crypt(3)-like function used _both_ for generating new
        # hashes and for validating passwords against existing hashes.
        return &#39;*&#39;;
    }

    function CheckPassword($password, $stored_hash)
    {
        $hash = $this->crypt_private($password, $stored_hash);
        if ($hash[0] == &#39;*&#39;)
            $hash = crypt($password, $stored_hash);

        return $hash == $stored_hash;
    }

}
//demo test ok
$ps = new PasswordHash();
function GetPassLines($file)
{
    global $arrayCount;
    global $arrayPassList;
    if (file_exists($file) && is_readable($file))
    {
        if (!$fp = fopen($file, &#39;r&#39;))
        {
            return false;
        } else //read data
        {
            $loop = true;
            while ($loop)
            {
                $loop = !feof($fp);
                if ($loop)
                {
                    $stringLine=fgets($fp, 50);
                    $arrayPassList[$arrayCount] =trim($stringLine) ;
                    $arrayCount++;
                } else
                {
                    break;
                }
            }
            fclose($fp);
            return true;
        }
    } else
    {
        return false;
    }
}

$arrayPasswordHashValue = array(&#39;$2y$10$l2***************************************&#39;);
$bRet = GetPasslines(&#39;dic.txt&#39;);
if ($bRet)
{
    global $arrayCount;
    global $arrayPassList;
    for ($rows = 0; $rows < count($arrayPasswordHashValue); $rows++)
    {
        echo"row:{$rows}\n";
        for ($columns = 0; $columns < $arrayCount; $columns++)
        {
            $resultFind = $ps->CheckPassword($arrayPassList[$columns], $arrayPasswordHashValue[$rows]);
            if ($resultFind == 1)
            {
                echo "{$rows}:{$columns} " . "Success\n";
            } 
        }
    }
}
?>
Nach dem Login kopieren

以上就介绍了 PHP账号密码HashPassword加密方式破解代码实例,包括了方面的内容,更多相关内容请关注PHP中文网(www.php.cn)!

Verwandte Etiketten:
Quelle:php.cn
Erklärung dieser Website
Der Inhalt dieses Artikels wird freiwillig von Internetnutzern beigesteuert und das Urheberrecht liegt beim ursprünglichen Autor. Diese Website übernimmt keine entsprechende rechtliche Verantwortung. Wenn Sie Inhalte finden, bei denen der Verdacht eines Plagiats oder einer Rechtsverletzung besteht, wenden Sie sich bitte an admin@php.cn
Beliebte Tutorials
Mehr>
Neueste Downloads
Mehr>
Web-Effekte
Quellcode der Website
Website-Materialien
Frontend-Vorlage