有一个解密chrome cookie的事情,google出了代码,却不能正常执行,原因在于sqlite3的版本太低,虽然我切换到了python3.5的环境,但sqlite3的版本也只有3.6。
google了许久,终于找到方法:
1、 进入页面 http://www6.atomicorp.com/channels/atomic/centos/6/x86_64/RPMS/
2、 下载 atomic-sqlite-sqlite-3.8.5-2.el6.art.x86_64.rpm
3、 rpm -Uvh atomic-sqlite-sqlite-3.8.5-2.el6.art.x86_64.rpm
4、 执行命令 sqlite3 -version 一切都ok啦
顺便附上解析cookie的代码
#coding=utf-8
import os
import sqlite3
#import keyring
from Crypto.Cipher import AES
from Crypto.Protocol.KDF import PBKDF2
#for mac
#my_pass = keyring.get_password('Chrome Safe Storage', 'Chrome')
#my_pass = my_pass.encode('utf8')
#iterations = 1003
#cookie_file = os.path.expanduser('~/Library/Application Support/Google/Chrome/Default/Cookies')
#for linux
my_pass = 'peanuts'.encode('utf8')
iterations = 1
cookie_file = 'Cookies'
salt = b'saltysalt'
length = 16
iv = b' ' * length
def expand_str(token):
token_len = len(token)
expand_len = (token_len // length + 1) * length - token_len
return token.encode('ascii') + b'\x0c' * expand_len
def aes_encrypt(token):
key = PBKDF2(my_pass, salt, length, iterations)
cipher = AES.new(key, AES.MODE_CBC, IV=iv)
enc_token = cipher.encrypt(token)
return b'v10' + enc_token
def aes_decrypt(token):
key = PBKDF2(my_pass, salt, length, iterations)
cipher = AES.new(key, AES.MODE_CBC, IV=iv)
dec_token = cipher.decrypt(token)
return dec_token
def query_cookies():
with sqlite3.connect(cookie_file) as conn:
sql = "select host_key, name, encrypted_value from cookies where name = 'jzysYonghu'"
#sql = "select * from cookies"
result = conn.execute(sql).fetchall()
return result
def write_cookies(enc_token):
with sqlite3.connect(cookie_file) as conn:
b = sqlite3.Binary(enc_token)
sql = """update cookies set encrypted_value = ? where name = 'remember_token'"""
conn.execute(sql, (b, ))
def change_user(token):
write_cookies(ase_encrypt(expand_str(token)))
if __name__ == '__main__':
data = query_cookies()[0][2]
print(data)
print(len(data))
print(aes_decrypt(data[3:]))
加密后在字符串前面添加了一个v10,因此解密前要先去掉
关注公众号,更多python干货分享