[Forensics-changes] [bruteforce-salted-openssl] 02/02: Imported Debian patch 1.3.2-1

Joao Eriberto Mota Filho eriberto at moszumanska.debian.org
Tue Sep 27 02:31:37 UTC 2016


This is an automated email from the git hooks/post-receive script.

eriberto pushed a commit to branch debian
in repository bruteforce-salted-openssl.

commit 2adbbd3b2aad98f4312efabee61b36f1a6f2a5a1
Author: Joao Eriberto Mota Filho <eriberto at debian.org>
Date:   Mon Sep 26 10:10:02 2016 -0300

    Imported Debian patch 1.3.2-1
---
 debian/changelog                             |   5 ++
 debian/compat                                |   1 +
 debian/contrib/bruteforce-salted-openssl.txt | 114 +++++++++++++++++++++++++++
 debian/control                               |  47 +++++++++++
 debian/copyright                             |  83 +++++++++++++++++++
 debian/docs                                  |   2 +
 debian/rules                                 |   7 ++
 debian/source/format                         |   1 +
 debian/watch                                 |   2 +
 9 files changed, 262 insertions(+)

diff --git a/debian/changelog b/debian/changelog
new file mode 100644
index 0000000..50c75fb
--- /dev/null
+++ b/debian/changelog
@@ -0,0 +1,5 @@
+bruteforce-salted-openssl (1.3.2-1) unstable; urgency=medium
+
+  * Initial release (Closes: #838848)
+
+ -- Joao Eriberto Mota Filho <eriberto at debian.org>  Mon, 26 Sep 2016 10:10:02 -0300
diff --git a/debian/compat b/debian/compat
new file mode 100644
index 0000000..ec63514
--- /dev/null
+++ b/debian/compat
@@ -0,0 +1 @@
+9
diff --git a/debian/contrib/bruteforce-salted-openssl.txt b/debian/contrib/bruteforce-salted-openssl.txt
new file mode 100644
index 0000000..caa2d75
--- /dev/null
+++ b/debian/contrib/bruteforce-salted-openssl.txt
@@ -0,0 +1,114 @@
+\" txt2man -d "25 Sep 2016" -t bruteforce-salted-openssl -r bruteforced-salted-openssl-1.3.1
+\" -s 1 -v "try to find the passphrase for files encrypted with OpenSSL" bruteforce-salted-openssl.txt
+\" > bruteforce-salted-openssl.1
+
+NAME
+  bruteforce-salted-openssl - try to find the passphrase for files encrypted with OpenSSL
+
+SYNOPSIS
+  bruteforce-salted-openssl [options] <filename>
+
+DESCRIPTION
+  bruteforce-salted-openssl try to find the passphrase or password of a file that was
+  encrypted with the openssl command. It can be used in two ways:
+
+   * Try all possible passwords given a charset.
+   * Try all passwords in a file (dictionary).
+
+  bruteforce-salted-openssl have the following features:
+
+   * You can specify the number of threads to use when cracking a file.
+   * The program should be able to use all the digests and symmetric ciphers available
+     with the OpenSSL libraries installed on your system.
+   * Sending a USR1 signal to a running bruteforce-salted-openssl process makes it print
+     progress and continue.
+   * There are an exhaustive mode and a dictionary mode.
+
+  In the exhaustive mode the program tries to decrypt the file by trying all possible
+  passwords. It is especially useful if you know something about the password (i.e. you
+  forgot a part of your password but still remember most of it). Finding the password of
+  the file without knowing anything about it would take way too much time (unless the
+  password is really short and/or weak). There are some command line options to specify:
+
+   * The minimum password length to try.
+   * The maximum password length to try.
+   * The beginning of the password.
+   * The end of the password.
+   * The character set to use (among the characters of the current locale).
+
+  In dictionary mode the program tries to decrypt the file by trying all the passwords
+  contained in a file. The file must have one password per line.
+
+OPTIONS
+  -1           Stop the program after finding the first password candidate.
+  -a           List the available cipher and digest algorithms.
+  -B <file>    Search using binary passwords (instead of character passwords).
+               Write candidates to <file>.
+  -b <string>  Beginning of the password. The default value is "".
+  -c <cipher>  Cipher for decryption. The default value is aes-256-cbc.
+  -d <digest>  Digest for key and initialization vector generation. Default: md5.
+  -e <string>  End of the password. Default: "".
+  -f <file>    Read the passwords from a file instead of generating them.
+  -h           Show help and quit.
+  -L <n>       Limit the maximum number of tested passwords to <n>.
+  -l <length>  Minimum password length (beginning and end included). Default: 1.
+  -M <string>  Consider the decryption as successful when the data starts with <string>.
+               Without this option, the decryption is considered as successful when the
+               data contains mostly printable ASCII characters (at least 90%).
+  -m <length>  Maximum password length (beginning and end included). Default: 8.
+  -N           Ignore decryption errors (similar to openssl -nopad).
+  -p <n>       Print a message every <n> passwords tested.
+  -s <string>  Password character set. Default value is "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"
+  -t <n>       Number of threads to use. Default: 1.
+
+  Note: Sending a USR1 signal to a running bruteforce-salted-openssl process makes it print
+  progress info to standard error and continue.
+
+LIMITATIONS
+  The program considers decrypted data as correct if it is mainly composed of printable
+  ASCII characters (at least 90%). If the file you want to decrypt doesn't contain plain
+  text, you will have to either use the -M option, or modify the 'valid_data' function
+  in the source code to match your needs.
+
+  If the file you want to decrypt is big, you should use the -N option on a truncated
+  version of the file (to avoid decrypting the whole file with each password).
+
+EXAMPLES
+  Try to find the password of an aes256 encrypted file using 4 threads, trying only
+  passwords with 5 characters:
+
+    $ bruteforce-salted-openssl -t 4 -l 5 -m 5 -c aes256 encrypted.file
+
+  Try to find the password of an aes256 encrypted file using 4 threads, trying only
+  passwords with 5 characters and print the password currently tried every 100000 attempts:
+
+    $ bruteforce-salted-openssl -t 4 -l 5 -m 5 -c aes256 -p 100000 encrypted.file
+
+  Try to find the password of a des3 encrypted file using 8 threads, trying only passwords
+  with 9 to 11 characters, beginning with "AbCD", ending with "Ef", and containing only letters:
+
+    $ bruteforce-salted-openssl -t 8 -l 9 -m 11 -c des3 -b "AbCD" -e "Ef" -s "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz" encrypted.file
+
+  Try to find the password of an aes256 encrypted file using 6 threads, trying the passwords contained in a dictionary file:
+
+    $ bruteforce-salted-openssl -t 6 -f dictionary.txt -c aes256 encrypted-file
+
+  Show the list of available algorithms:
+
+    $ bruteforce-salted-openssl -a
+
+  If the program finds a candidate password 'pwd', you can decrypt the data using the 'openssl' command:
+
+    $ openssl enc -d -aes256 -salt -in encrypted.file -out decrypted.file -k pwd
+
+DONATIONS
+  If you find this program useful and want to make a donation, you can send coins to one of the following addresses:
+
+  * Peercoin: PWFNV1Cvq7nQBRyRueuYzwmDNXUGpgNkBC
+  * Bitcoin: 1F1ZfM7XtggHsShK4vwuy9zv98a9wt7nXx
+
+AUTHOR
+  bruteforce-salted-openssl was written by Guillaume LE VAILLANT. For contact, use the email <guillaume.le.vaillant at openmailbox.org>
+  or go to https://github.com/glv2/bruteforce-salted-openssl.
+
+  This manual page was written by Joao Eriberto Mota Filho <eriberto at debian.org> for the Debian project (but may be used by others).
diff --git a/debian/control b/debian/control
new file mode 100644
index 0000000..8ceb321
--- /dev/null
+++ b/debian/control
@@ -0,0 +1,47 @@
+Source: bruteforce-salted-openssl
+Section: utils
+Priority: optional
+Maintainer: Debian Forensics <forensics-devel at lists.alioth.debian.org>
+Uploaders: Joao Eriberto Mota Filho <eriberto at debian.org>
+Build-Depends: debhelper (>= 9), dh-autoreconf, libssl-dev
+Standards-Version: 3.9.8
+Homepage: https://github.com/glv2/bruteforce-salted-openssl
+Vcs-Git: https://anonscm.debian.org/collab-maint/bruteforce-salted-openssl.git
+Vcs-Browser: https://anonscm.debian.org/git/collab-maint/bruteforce-salted-openssl.git
+
+Package: bruteforce-salted-openssl
+Architecture: any
+Depends: ${shlibs:Depends}, ${misc:Depends}
+Description: try to find the passphrase for files encrypted with OpenSSL
+ bruteforce-salted-openssl try to find the passphrase or password of a file
+ that was encrypted with the openssl command. It can be used in two ways:
+ .
+    - Try all possible passwords given a charset.
+    - Try all passwords in a file (dictionary).
+ .
+ bruteforce-salted-openssl have the following features:
+ .
+    - You can specify the number of threads to use when cracking a file.
+    - The program should be able to use all the digests and symmetric ciphers
+      available with the OpenSSL libraries installed on your system.
+    - Sending a USR1 signal to a running bruteforce-salted-openssl process
+      makes it print progress and continue.
+    - There are an exhaustive mode and a dictionary mode.
+ .
+ In the exhaustive mode the program tries to decrypt the file by trying all
+ possible passwords. It is especially useful if you know something about the
+ password (i.e. you forgot a part of your password but still remember most of
+ it). Finding the password of the file without knowing anything about it would
+ take way too much time (unless the password is really short and/or weak).
+ There are some command line options to specify:
+ .
+    - The minimum password length to try.
+    - The maximum password length to try.
+    - The beginning of the password.
+    - The end of the password.
+    - The character set to use (among the characters of the current locale).
+ .
+ In dictionary mode the program tries to decrypt the file by trying all the
+ passwords contained in a file. The file must have one password per line.
+ .
+ This package is useful for security, pentests and forensics investigations.
diff --git a/debian/copyright b/debian/copyright
new file mode 100644
index 0000000..00644d1
--- /dev/null
+++ b/debian/copyright
@@ -0,0 +1,83 @@
+Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
+Upstream-Name: bruteforce-salted-openssl
+Source: https://github.com/glv2/bruteforce-salted-openssl
+
+Files: *
+Copyright: 2014-2016 Guillaume LE VAILLANT <guillaume.le.vaillant at openmailbox.org>
+License: GPL-3+ with OpenSSL exception
+
+Files: contrib/gentoo/app-crypt/bruteforce-salted-openssl/*
+Copyright: 2014-2016 Guillaume LE VAILLANT <guillaume.le.vaillant at openmailbox.org>
+License: GPL-3
+
+Files: debian/*
+Copyright: 2016 Joao Eriberto Mota Filho <eriberto at debian.org>
+License: BSD-3-Clause
+
+License: GPL-3+ with OpenSSL exception
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+ .
+ Additional permission under GNU GPL version 3 section 7:
+ .
+ If you modify this program, or any covered work, by linking or combining
+ it with the OpenSSL library (or a modified version of that library),
+ containing parts covered by the terms of the OpenSSL license, the licensors
+ of this program grant you additional permission to convey the resulting work.
+ Corresponding source for a non-source form of such a combination shall include
+ the source code for the parts of the OpenSSL library used as well as that of
+ the covered work.
+ .
+ This package is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ GNU General Public License for more details.
+ .
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <https://www.gnu.org/licenses/>.
+ .
+ On Debian systems, the complete text of the GNU General
+ Public License version 3 can be found in "/usr/share/common-licenses/GPL-3".
+
+License: GPL-3
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, version 3 of the License.
+ .
+ This package is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ GNU General Public License for more details.
+ .
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <https://www.gnu.org/licenses/>.
+ .
+ On Debian systems, the complete text of the GNU General
+ Public License version 3 can be found in "/usr/share/common-licenses/GPL-3".
+
+License: BSD-3-Clause
+ Redistribution and use in source and binary forms, with or without
+ modification, are permitted provided that the following conditions
+ are met:
+ 1. Redistributions of source code must retain the above copyright
+    notice, this list of conditions and the following disclaimer.
+ 2. Redistributions in binary form must reproduce the above copyright
+    notice, this list of conditions and the following disclaimer in the
+    documentation and/or other materials provided with the distribution.
+ 3. Neither the name of the University nor the names of its contributors
+    may be used to endorse or promote products derived from this software
+    without specific prior written permission.
+ .
+ THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE HOLDERS OR
+ CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
+ EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+ PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
+ PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
diff --git a/debian/docs b/debian/docs
new file mode 100644
index 0000000..6f12db5
--- /dev/null
+++ b/debian/docs
@@ -0,0 +1,2 @@
+AUTHORS
+README
diff --git a/debian/rules b/debian/rules
new file mode 100755
index 0000000..826087f
--- /dev/null
+++ b/debian/rules
@@ -0,0 +1,7 @@
+#!/usr/bin/make -f
+#export DH_VERBOSE = 1
+
+export DEB_BUILD_MAINT_OPTIONS = hardening=+all
+
+%:
+	dh $@ --with autoreconf
diff --git a/debian/source/format b/debian/source/format
new file mode 100644
index 0000000..163aaf8
--- /dev/null
+++ b/debian/source/format
@@ -0,0 +1 @@
+3.0 (quilt)
diff --git a/debian/watch b/debian/watch
new file mode 100644
index 0000000..64e29a6
--- /dev/null
+++ b/debian/watch
@@ -0,0 +1,2 @@
+version=4
+https://github.com/glv2/bruteforce-salted-openssl/releases .*/archive/v?(\d\S+)\.tar\.(?:bz2|gz|xz)

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/forensics/bruteforce-salted-openssl.git



More information about the forensics-changes mailing list