souleyez 2.43.26__py3-none-any.whl → 2.43.34__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- souleyez/__init__.py +1 -2
- souleyez/ai/__init__.py +21 -15
- souleyez/ai/action_mapper.py +249 -150
- souleyez/ai/chain_advisor.py +116 -100
- souleyez/ai/claude_provider.py +29 -28
- souleyez/ai/context_builder.py +80 -62
- souleyez/ai/executor.py +158 -117
- souleyez/ai/feedback_handler.py +136 -121
- souleyez/ai/llm_factory.py +27 -20
- souleyez/ai/llm_provider.py +4 -2
- souleyez/ai/ollama_provider.py +6 -9
- souleyez/ai/ollama_service.py +44 -37
- souleyez/ai/path_scorer.py +91 -76
- souleyez/ai/recommender.py +176 -144
- souleyez/ai/report_context.py +74 -73
- souleyez/ai/report_service.py +84 -66
- souleyez/ai/result_parser.py +222 -229
- souleyez/ai/safety.py +67 -44
- souleyez/auth/__init__.py +23 -22
- souleyez/auth/audit.py +36 -26
- souleyez/auth/engagement_access.py +65 -48
- souleyez/auth/permissions.py +14 -3
- souleyez/auth/session_manager.py +54 -37
- souleyez/auth/user_manager.py +109 -64
- souleyez/commands/audit.py +40 -43
- souleyez/commands/auth.py +35 -15
- souleyez/commands/deliverables.py +55 -50
- souleyez/commands/engagement.py +47 -28
- souleyez/commands/license.py +32 -23
- souleyez/commands/screenshots.py +36 -32
- souleyez/commands/user.py +82 -36
- souleyez/config.py +52 -44
- souleyez/core/credential_tester.py +87 -81
- souleyez/core/cve_mappings.py +179 -192
- souleyez/core/cve_matcher.py +162 -148
- souleyez/core/msf_auto_mapper.py +100 -83
- souleyez/core/msf_chain_engine.py +294 -256
- souleyez/core/msf_database.py +153 -70
- souleyez/core/msf_integration.py +679 -673
- souleyez/core/msf_rpc_client.py +40 -42
- souleyez/core/msf_rpc_manager.py +77 -79
- souleyez/core/msf_sync_manager.py +241 -181
- souleyez/core/network_utils.py +22 -15
- souleyez/core/parser_handler.py +34 -25
- souleyez/core/pending_chains.py +114 -63
- souleyez/core/templates.py +158 -107
- souleyez/core/tool_chaining.py +9526 -2879
- souleyez/core/version_utils.py +79 -94
- souleyez/core/vuln_correlation.py +136 -89
- souleyez/core/web_utils.py +33 -32
- souleyez/data/wordlists/ad_users.txt +378 -0
- souleyez/data/wordlists/api_endpoints_large.txt +769 -0
- souleyez/data/wordlists/home_dir_sensitive.txt +39 -0
- souleyez/data/wordlists/lfi_payloads.txt +82 -0
- souleyez/data/wordlists/passwords_brute.txt +1548 -0
- souleyez/data/wordlists/passwords_crack.txt +2479 -0
- souleyez/data/wordlists/passwords_spray.txt +386 -0
- souleyez/data/wordlists/subdomains_large.txt +5057 -0
- souleyez/data/wordlists/usernames_common.txt +694 -0
- souleyez/data/wordlists/web_dirs_large.txt +4769 -0
- souleyez/detection/__init__.py +1 -1
- souleyez/detection/attack_signatures.py +12 -17
- souleyez/detection/mitre_mappings.py +61 -55
- souleyez/detection/validator.py +97 -86
- souleyez/devtools.py +23 -10
- souleyez/docs/README.md +4 -4
- souleyez/docs/api-reference/cli-commands.md +2 -2
- souleyez/docs/developer-guide/adding-new-tools.md +562 -0
- souleyez/docs/user-guide/auto-chaining.md +30 -8
- souleyez/docs/user-guide/getting-started.md +1 -1
- souleyez/docs/user-guide/installation.md +26 -3
- souleyez/docs/user-guide/metasploit-integration.md +2 -2
- souleyez/docs/user-guide/rbac.md +1 -1
- souleyez/docs/user-guide/scope-management.md +1 -1
- souleyez/docs/user-guide/siem-integration.md +1 -1
- souleyez/docs/user-guide/tools-reference.md +1 -8
- souleyez/docs/user-guide/worker-management.md +1 -1
- souleyez/engine/background.py +1239 -535
- souleyez/engine/base.py +4 -1
- souleyez/engine/job_status.py +17 -49
- souleyez/engine/log_sanitizer.py +103 -77
- souleyez/engine/manager.py +38 -7
- souleyez/engine/result_handler.py +2200 -1550
- souleyez/engine/worker_manager.py +50 -41
- souleyez/export/evidence_bundle.py +72 -62
- souleyez/feature_flags/features.py +16 -20
- souleyez/feature_flags.py +5 -9
- souleyez/handlers/__init__.py +11 -0
- souleyez/handlers/base.py +188 -0
- souleyez/handlers/bash_handler.py +277 -0
- souleyez/handlers/bloodhound_handler.py +243 -0
- souleyez/handlers/certipy_handler.py +311 -0
- souleyez/handlers/crackmapexec_handler.py +486 -0
- souleyez/handlers/dnsrecon_handler.py +344 -0
- souleyez/handlers/enum4linux_handler.py +400 -0
- souleyez/handlers/evil_winrm_handler.py +493 -0
- souleyez/handlers/ffuf_handler.py +815 -0
- souleyez/handlers/gobuster_handler.py +1114 -0
- souleyez/handlers/gpp_extract_handler.py +334 -0
- souleyez/handlers/hashcat_handler.py +444 -0
- souleyez/handlers/hydra_handler.py +563 -0
- souleyez/handlers/impacket_getuserspns_handler.py +343 -0
- souleyez/handlers/impacket_psexec_handler.py +222 -0
- souleyez/handlers/impacket_secretsdump_handler.py +426 -0
- souleyez/handlers/john_handler.py +286 -0
- souleyez/handlers/katana_handler.py +425 -0
- souleyez/handlers/kerbrute_handler.py +298 -0
- souleyez/handlers/ldapsearch_handler.py +636 -0
- souleyez/handlers/lfi_extract_handler.py +464 -0
- souleyez/handlers/msf_auxiliary_handler.py +408 -0
- souleyez/handlers/msf_exploit_handler.py +380 -0
- souleyez/handlers/nikto_handler.py +413 -0
- souleyez/handlers/nmap_handler.py +821 -0
- souleyez/handlers/nuclei_handler.py +359 -0
- souleyez/handlers/nxc_handler.py +371 -0
- souleyez/handlers/rdp_sec_check_handler.py +353 -0
- souleyez/handlers/registry.py +292 -0
- souleyez/handlers/responder_handler.py +232 -0
- souleyez/handlers/service_explorer_handler.py +434 -0
- souleyez/handlers/smbclient_handler.py +344 -0
- souleyez/handlers/smbmap_handler.py +510 -0
- souleyez/handlers/smbpasswd_handler.py +296 -0
- souleyez/handlers/sqlmap_handler.py +1116 -0
- souleyez/handlers/theharvester_handler.py +601 -0
- souleyez/handlers/web_login_test_handler.py +327 -0
- souleyez/handlers/whois_handler.py +277 -0
- souleyez/handlers/wpscan_handler.py +554 -0
- souleyez/history.py +32 -16
- souleyez/importers/msf_importer.py +106 -75
- souleyez/importers/smart_importer.py +208 -147
- souleyez/integrations/siem/__init__.py +10 -10
- souleyez/integrations/siem/base.py +17 -18
- souleyez/integrations/siem/elastic.py +108 -122
- souleyez/integrations/siem/factory.py +207 -80
- souleyez/integrations/siem/googlesecops.py +146 -154
- souleyez/integrations/siem/rule_mappings/__init__.py +1 -1
- souleyez/integrations/siem/rule_mappings/wazuh_rules.py +8 -5
- souleyez/integrations/siem/sentinel.py +107 -109
- souleyez/integrations/siem/splunk.py +246 -212
- souleyez/integrations/siem/wazuh.py +65 -71
- souleyez/integrations/wazuh/__init__.py +5 -5
- souleyez/integrations/wazuh/client.py +70 -93
- souleyez/integrations/wazuh/config.py +85 -57
- souleyez/integrations/wazuh/host_mapper.py +28 -36
- souleyez/integrations/wazuh/sync.py +78 -68
- souleyez/intelligence/__init__.py +4 -5
- souleyez/intelligence/correlation_analyzer.py +309 -295
- souleyez/intelligence/exploit_knowledge.py +661 -623
- souleyez/intelligence/exploit_suggestions.py +159 -139
- souleyez/intelligence/gap_analyzer.py +132 -97
- souleyez/intelligence/gap_detector.py +251 -214
- souleyez/intelligence/sensitive_tables.py +266 -129
- souleyez/intelligence/service_parser.py +137 -123
- souleyez/intelligence/surface_analyzer.py +407 -268
- souleyez/intelligence/target_parser.py +159 -162
- souleyez/licensing/__init__.py +6 -6
- souleyez/licensing/validator.py +17 -19
- souleyez/log_config.py +79 -54
- souleyez/main.py +1505 -687
- souleyez/migrations/fix_job_counter.py +16 -14
- souleyez/parsers/bloodhound_parser.py +41 -39
- souleyez/parsers/crackmapexec_parser.py +178 -111
- souleyez/parsers/dalfox_parser.py +72 -77
- souleyez/parsers/dnsrecon_parser.py +103 -91
- souleyez/parsers/enum4linux_parser.py +183 -153
- souleyez/parsers/ffuf_parser.py +29 -25
- souleyez/parsers/gobuster_parser.py +301 -41
- souleyez/parsers/hashcat_parser.py +324 -79
- souleyez/parsers/http_fingerprint_parser.py +350 -103
- souleyez/parsers/hydra_parser.py +131 -111
- souleyez/parsers/impacket_parser.py +231 -178
- souleyez/parsers/john_parser.py +98 -86
- souleyez/parsers/katana_parser.py +316 -0
- souleyez/parsers/msf_parser.py +943 -498
- souleyez/parsers/nikto_parser.py +346 -65
- souleyez/parsers/nmap_parser.py +262 -174
- souleyez/parsers/nuclei_parser.py +40 -44
- souleyez/parsers/responder_parser.py +26 -26
- souleyez/parsers/searchsploit_parser.py +74 -74
- souleyez/parsers/service_explorer_parser.py +279 -0
- souleyez/parsers/smbmap_parser.py +180 -124
- souleyez/parsers/sqlmap_parser.py +434 -308
- souleyez/parsers/theharvester_parser.py +75 -57
- souleyez/parsers/whois_parser.py +135 -94
- souleyez/parsers/wpscan_parser.py +278 -190
- souleyez/plugins/afp.py +44 -36
- souleyez/plugins/afp_brute.py +114 -46
- souleyez/plugins/ard.py +48 -37
- souleyez/plugins/bloodhound.py +95 -61
- souleyez/plugins/certipy.py +303 -0
- souleyez/plugins/crackmapexec.py +186 -85
- souleyez/plugins/dalfox.py +120 -59
- souleyez/plugins/dns_hijack.py +146 -41
- souleyez/plugins/dnsrecon.py +97 -61
- souleyez/plugins/enum4linux.py +91 -66
- souleyez/plugins/evil_winrm.py +291 -0
- souleyez/plugins/ffuf.py +166 -90
- souleyez/plugins/firmware_extract.py +133 -29
- souleyez/plugins/gobuster.py +387 -190
- souleyez/plugins/gpp_extract.py +393 -0
- souleyez/plugins/hashcat.py +100 -73
- souleyez/plugins/http_fingerprint.py +854 -267
- souleyez/plugins/hydra.py +566 -200
- souleyez/plugins/impacket_getnpusers.py +117 -69
- souleyez/plugins/impacket_psexec.py +84 -64
- souleyez/plugins/impacket_secretsdump.py +103 -69
- souleyez/plugins/impacket_smbclient.py +89 -75
- souleyez/plugins/john.py +86 -69
- souleyez/plugins/katana.py +313 -0
- souleyez/plugins/kerbrute.py +237 -0
- souleyez/plugins/lfi_extract.py +541 -0
- souleyez/plugins/macos_ssh.py +117 -48
- souleyez/plugins/mdns.py +35 -30
- souleyez/plugins/msf_auxiliary.py +253 -130
- souleyez/plugins/msf_exploit.py +239 -161
- souleyez/plugins/nikto.py +134 -78
- souleyez/plugins/nmap.py +275 -91
- souleyez/plugins/nuclei.py +180 -89
- souleyez/plugins/nxc.py +285 -0
- souleyez/plugins/plugin_base.py +35 -36
- souleyez/plugins/plugin_template.py +13 -5
- souleyez/plugins/rdp_sec_check.py +130 -0
- souleyez/plugins/responder.py +112 -71
- souleyez/plugins/router_http_brute.py +76 -65
- souleyez/plugins/router_ssh_brute.py +118 -41
- souleyez/plugins/router_telnet_brute.py +124 -42
- souleyez/plugins/routersploit.py +91 -59
- souleyez/plugins/routersploit_exploit.py +77 -55
- souleyez/plugins/searchsploit.py +91 -77
- souleyez/plugins/service_explorer.py +1160 -0
- souleyez/plugins/smbmap.py +122 -72
- souleyez/plugins/smbpasswd.py +215 -0
- souleyez/plugins/sqlmap.py +301 -113
- souleyez/plugins/theharvester.py +127 -75
- souleyez/plugins/tr069.py +79 -57
- souleyez/plugins/upnp.py +65 -47
- souleyez/plugins/upnp_abuse.py +73 -55
- souleyez/plugins/vnc_access.py +129 -42
- souleyez/plugins/vnc_brute.py +109 -38
- souleyez/plugins/web_login_test.py +417 -0
- souleyez/plugins/whois.py +77 -58
- souleyez/plugins/wpscan.py +173 -69
- souleyez/reporting/__init__.py +2 -1
- souleyez/reporting/attack_chain.py +411 -346
- souleyez/reporting/charts.py +436 -501
- souleyez/reporting/compliance_mappings.py +334 -201
- souleyez/reporting/detection_report.py +126 -125
- souleyez/reporting/formatters.py +828 -591
- souleyez/reporting/generator.py +386 -302
- souleyez/reporting/metrics.py +72 -75
- souleyez/scanner.py +35 -29
- souleyez/security/__init__.py +37 -11
- souleyez/security/scope_validator.py +175 -106
- souleyez/security/validation.py +223 -149
- souleyez/security.py +22 -6
- souleyez/storage/credentials.py +247 -186
- souleyez/storage/crypto.py +296 -129
- souleyez/storage/database.py +73 -50
- souleyez/storage/db.py +58 -36
- souleyez/storage/deliverable_evidence.py +177 -128
- souleyez/storage/deliverable_exporter.py +282 -246
- souleyez/storage/deliverable_templates.py +134 -116
- souleyez/storage/deliverables.py +135 -130
- souleyez/storage/engagements.py +109 -56
- souleyez/storage/evidence.py +181 -152
- souleyez/storage/execution_log.py +31 -17
- souleyez/storage/exploit_attempts.py +93 -57
- souleyez/storage/exploits.py +67 -36
- souleyez/storage/findings.py +48 -61
- souleyez/storage/hosts.py +176 -144
- souleyez/storage/migrate_to_engagements.py +43 -19
- souleyez/storage/migrations/_001_add_credential_enhancements.py +22 -12
- souleyez/storage/migrations/_002_add_status_tracking.py +10 -7
- souleyez/storage/migrations/_003_add_execution_log.py +14 -8
- souleyez/storage/migrations/_005_screenshots.py +13 -5
- souleyez/storage/migrations/_006_deliverables.py +13 -5
- souleyez/storage/migrations/_007_deliverable_templates.py +12 -7
- souleyez/storage/migrations/_008_add_nuclei_table.py +10 -4
- souleyez/storage/migrations/_010_evidence_linking.py +17 -10
- souleyez/storage/migrations/_011_timeline_tracking.py +20 -13
- souleyez/storage/migrations/_012_team_collaboration.py +34 -21
- souleyez/storage/migrations/_013_add_host_tags.py +12 -6
- souleyez/storage/migrations/_014_exploit_attempts.py +22 -10
- souleyez/storage/migrations/_015_add_mac_os_fields.py +15 -7
- souleyez/storage/migrations/_016_add_domain_field.py +10 -4
- souleyez/storage/migrations/_017_msf_sessions.py +16 -8
- souleyez/storage/migrations/_018_add_osint_target.py +10 -6
- souleyez/storage/migrations/_019_add_engagement_type.py +10 -6
- souleyez/storage/migrations/_020_add_rbac.py +36 -15
- souleyez/storage/migrations/_021_wazuh_integration.py +20 -8
- souleyez/storage/migrations/_022_wazuh_indexer_columns.py +6 -4
- souleyez/storage/migrations/_023_fix_detection_results_fk.py +16 -6
- souleyez/storage/migrations/_024_wazuh_vulnerabilities.py +26 -10
- souleyez/storage/migrations/_025_multi_siem_support.py +3 -5
- souleyez/storage/migrations/_026_add_engagement_scope.py +31 -12
- souleyez/storage/migrations/_027_multi_siem_persistence.py +32 -15
- souleyez/storage/migrations/__init__.py +26 -26
- souleyez/storage/migrations/migration_manager.py +19 -19
- souleyez/storage/msf_sessions.py +100 -65
- souleyez/storage/osint.py +17 -24
- souleyez/storage/recommendation_engine.py +269 -235
- souleyez/storage/screenshots.py +33 -32
- souleyez/storage/smb_shares.py +136 -92
- souleyez/storage/sqlmap_data.py +183 -128
- souleyez/storage/team_collaboration.py +135 -141
- souleyez/storage/timeline_tracker.py +122 -94
- souleyez/storage/wazuh_vulns.py +64 -66
- souleyez/storage/web_paths.py +33 -37
- souleyez/testing/credential_tester.py +221 -205
- souleyez/ui/__init__.py +1 -1
- souleyez/ui/ai_quotes.py +12 -12
- souleyez/ui/attack_surface.py +2439 -1516
- souleyez/ui/chain_rules_view.py +914 -382
- souleyez/ui/correlation_view.py +312 -230
- souleyez/ui/dashboard.py +2382 -1130
- souleyez/ui/deliverables_view.py +148 -62
- souleyez/ui/design_system.py +13 -13
- souleyez/ui/errors.py +49 -49
- souleyez/ui/evidence_linking_view.py +284 -179
- souleyez/ui/evidence_vault.py +393 -285
- souleyez/ui/exploit_suggestions_view.py +555 -349
- souleyez/ui/export_view.py +100 -66
- souleyez/ui/gap_analysis_view.py +315 -171
- souleyez/ui/help_system.py +105 -97
- souleyez/ui/intelligence_view.py +436 -293
- souleyez/ui/interactive.py +23434 -10286
- souleyez/ui/interactive_selector.py +75 -68
- souleyez/ui/log_formatter.py +47 -39
- souleyez/ui/menu_components.py +22 -13
- souleyez/ui/msf_auxiliary_menu.py +184 -133
- souleyez/ui/pending_chains_view.py +336 -172
- souleyez/ui/progress_indicators.py +5 -3
- souleyez/ui/recommendations_view.py +195 -137
- souleyez/ui/rule_builder.py +343 -225
- souleyez/ui/setup_wizard.py +678 -284
- souleyez/ui/shortcuts.py +217 -165
- souleyez/ui/splunk_gap_analysis_view.py +452 -270
- souleyez/ui/splunk_vulns_view.py +139 -86
- souleyez/ui/team_dashboard.py +498 -335
- souleyez/ui/template_selector.py +196 -105
- souleyez/ui/terminal.py +6 -6
- souleyez/ui/timeline_view.py +198 -127
- souleyez/ui/tool_setup.py +264 -164
- souleyez/ui/tutorial.py +202 -72
- souleyez/ui/tutorial_state.py +40 -40
- souleyez/ui/wazuh_vulns_view.py +235 -141
- souleyez/ui/wordlist_browser.py +260 -107
- souleyez/ui.py +464 -312
- souleyez/utils/tool_checker.py +427 -367
- souleyez/utils.py +33 -29
- souleyez/wordlists.py +134 -167
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/METADATA +1 -1
- souleyez-2.43.34.dist-info/RECORD +443 -0
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/WHEEL +1 -1
- souleyez-2.43.26.dist-info/RECORD +0 -379
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/entry_points.txt +0 -0
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/licenses/LICENSE +0 -0
- {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,444 @@
|
|
|
1
|
+
#!/usr/bin/env python3
|
|
2
|
+
"""
|
|
3
|
+
Hashcat handler.
|
|
4
|
+
|
|
5
|
+
Consolidates parsing and display logic for Hashcat password cracking jobs.
|
|
6
|
+
"""
|
|
7
|
+
import logging
|
|
8
|
+
import os
|
|
9
|
+
from typing import Any, Dict, Optional
|
|
10
|
+
|
|
11
|
+
import click
|
|
12
|
+
|
|
13
|
+
from souleyez.engine.job_status import STATUS_DONE, STATUS_NO_RESULTS
|
|
14
|
+
from souleyez.handlers.base import BaseToolHandler
|
|
15
|
+
|
|
16
|
+
logger = logging.getLogger(__name__)
|
|
17
|
+
|
|
18
|
+
|
|
19
|
+
class HashcatHandler(BaseToolHandler):
|
|
20
|
+
"""Handler for Hashcat password cracking jobs."""
|
|
21
|
+
|
|
22
|
+
tool_name = "hashcat"
|
|
23
|
+
display_name = "Hashcat"
|
|
24
|
+
|
|
25
|
+
# All handlers enabled
|
|
26
|
+
has_error_handler = True
|
|
27
|
+
has_warning_handler = True
|
|
28
|
+
has_no_results_handler = True
|
|
29
|
+
has_done_handler = True
|
|
30
|
+
|
|
31
|
+
def parse_job(
|
|
32
|
+
self,
|
|
33
|
+
engagement_id: int,
|
|
34
|
+
log_path: str,
|
|
35
|
+
job: Dict[str, Any],
|
|
36
|
+
host_manager: Optional[Any] = None,
|
|
37
|
+
findings_manager: Optional[Any] = None,
|
|
38
|
+
credentials_manager: Optional[Any] = None,
|
|
39
|
+
) -> Dict[str, Any]:
|
|
40
|
+
"""
|
|
41
|
+
Parse Hashcat job results.
|
|
42
|
+
|
|
43
|
+
Extracts cracked passwords and stores them as credentials.
|
|
44
|
+
"""
|
|
45
|
+
try:
|
|
46
|
+
from souleyez.parsers.hashcat_parser import parse_hashcat_output
|
|
47
|
+
|
|
48
|
+
# Import managers if not provided
|
|
49
|
+
if findings_manager is None:
|
|
50
|
+
from souleyez.storage.findings import FindingsManager
|
|
51
|
+
|
|
52
|
+
findings_manager = FindingsManager()
|
|
53
|
+
if credentials_manager is None:
|
|
54
|
+
from souleyez.storage.credentials import CredentialsManager
|
|
55
|
+
|
|
56
|
+
credentials_manager = CredentialsManager()
|
|
57
|
+
|
|
58
|
+
# Read the log file if it exists
|
|
59
|
+
log_content = ""
|
|
60
|
+
if log_path and os.path.exists(log_path):
|
|
61
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
62
|
+
log_content = f.read()
|
|
63
|
+
|
|
64
|
+
# Parse hashcat output
|
|
65
|
+
# hash_file can be in metadata or as the job target (since target IS the hash file for hashcat)
|
|
66
|
+
hash_file = job.get("metadata", {}).get("hash_file", "") or job.get(
|
|
67
|
+
"target", ""
|
|
68
|
+
)
|
|
69
|
+
parsed = parse_hashcat_output(log_content, hash_file)
|
|
70
|
+
|
|
71
|
+
# If no cracked passwords but potfile hits OR no log, check potfile directly
|
|
72
|
+
# This handles both: (1) no log file, (2) log exists but hashes were in potfile
|
|
73
|
+
has_potfile_hits = parsed.get("stats", {}).get("potfile_hits", 0) > 0
|
|
74
|
+
no_cracked = not parsed.get("cracked")
|
|
75
|
+
if (no_cracked and has_potfile_hits) or (not log_content and hash_file):
|
|
76
|
+
if hash_file and os.path.exists(hash_file):
|
|
77
|
+
from souleyez.parsers.hashcat_parser import _get_potfile_cracked
|
|
78
|
+
|
|
79
|
+
# Build hash → username mapping from hash file
|
|
80
|
+
hash_to_username = {}
|
|
81
|
+
try:
|
|
82
|
+
import re
|
|
83
|
+
|
|
84
|
+
with open(
|
|
85
|
+
hash_file, "r", encoding="utf-8", errors="replace"
|
|
86
|
+
) as f:
|
|
87
|
+
for line in f:
|
|
88
|
+
line = line.strip()
|
|
89
|
+
if ":" in line and not line.startswith("#"):
|
|
90
|
+
parts = line.split(":")
|
|
91
|
+
if len(parts) >= 2:
|
|
92
|
+
potential_user = parts[0].strip()
|
|
93
|
+
potential_hash = parts[1].strip()
|
|
94
|
+
if re.match(
|
|
95
|
+
r"^[a-fA-F0-9]+$", potential_hash
|
|
96
|
+
) or potential_hash.startswith("$"):
|
|
97
|
+
hash_to_username[potential_hash.lower()] = (
|
|
98
|
+
potential_user
|
|
99
|
+
)
|
|
100
|
+
except Exception:
|
|
101
|
+
pass
|
|
102
|
+
potfile_cracked = _get_potfile_cracked(hash_file, hash_to_username)
|
|
103
|
+
if potfile_cracked:
|
|
104
|
+
parsed["cracked"] = potfile_cracked
|
|
105
|
+
parsed["stats"]["cracked_count"] = len(potfile_cracked)
|
|
106
|
+
parsed["stats"]["status"] = "already_cracked"
|
|
107
|
+
parsed["stats"]["potfile_hits"] = len(potfile_cracked)
|
|
108
|
+
|
|
109
|
+
# Store credentials
|
|
110
|
+
creds_added = 0
|
|
111
|
+
for cracked in parsed.get("cracked", []):
|
|
112
|
+
try:
|
|
113
|
+
# Extract username if available (Kerberos hashes include it)
|
|
114
|
+
username = cracked.get("username", "")
|
|
115
|
+
hash_type = cracked.get("hash_type", "unknown")
|
|
116
|
+
|
|
117
|
+
# Determine service based on hash type
|
|
118
|
+
if hash_type == "kerberos":
|
|
119
|
+
service = "kerberos"
|
|
120
|
+
else:
|
|
121
|
+
service = "cracked_hash"
|
|
122
|
+
|
|
123
|
+
credentials_manager.add_credential(
|
|
124
|
+
engagement_id=engagement_id,
|
|
125
|
+
host_id=None, # Hash cracking typically not tied to a specific host
|
|
126
|
+
username=username,
|
|
127
|
+
password=cracked["password"],
|
|
128
|
+
service=service,
|
|
129
|
+
credential_type="password",
|
|
130
|
+
tool="hashcat",
|
|
131
|
+
status="cracked",
|
|
132
|
+
notes=f"Cracked {hash_type} hash: {cracked['hash'][:50]}...",
|
|
133
|
+
)
|
|
134
|
+
creds_added += 1
|
|
135
|
+
logger.info(f"Hashcat cracked: {username}:{cracked['password']}")
|
|
136
|
+
except Exception as e:
|
|
137
|
+
logger.debug(f"Error adding credential: {e}")
|
|
138
|
+
pass # Skip duplicates
|
|
139
|
+
|
|
140
|
+
# Create finding if we cracked passwords
|
|
141
|
+
findings_added = 0
|
|
142
|
+
if parsed.get("cracked"):
|
|
143
|
+
findings_manager.add_finding(
|
|
144
|
+
engagement_id=engagement_id,
|
|
145
|
+
title=f"Password Hashes Cracked - {len(parsed['cracked'])} passwords recovered",
|
|
146
|
+
finding_type="credential",
|
|
147
|
+
severity="high",
|
|
148
|
+
description=f"Hashcat successfully cracked {len(parsed['cracked'])} password hash(es).\n\n"
|
|
149
|
+
f"Status: {parsed['stats'].get('status', 'unknown')}\n"
|
|
150
|
+
f"Cracked: {parsed['stats'].get('cracked_count', len(parsed['cracked']))}",
|
|
151
|
+
tool="hashcat",
|
|
152
|
+
)
|
|
153
|
+
findings_added += 1
|
|
154
|
+
|
|
155
|
+
# Determine status - check multiple indicators
|
|
156
|
+
cracked_list = parsed.get("cracked", [])
|
|
157
|
+
hashcat_status = parsed["stats"].get("status", "unknown")
|
|
158
|
+
|
|
159
|
+
if creds_added > 0 or cracked_list or hashcat_status == "cracked":
|
|
160
|
+
status = STATUS_DONE
|
|
161
|
+
elif hashcat_status == "exhausted":
|
|
162
|
+
status = STATUS_NO_RESULTS # Ran to completion but found nothing
|
|
163
|
+
else:
|
|
164
|
+
status = STATUS_NO_RESULTS
|
|
165
|
+
|
|
166
|
+
# Build summary for job queue display
|
|
167
|
+
summary_parts = []
|
|
168
|
+
total_count = parsed["stats"].get("total_count", 0)
|
|
169
|
+
cracked_count = len(cracked_list)
|
|
170
|
+
if cracked_count > 0:
|
|
171
|
+
summary_parts.append(f"{cracked_count}/{total_count} cracked")
|
|
172
|
+
elif total_count > 0:
|
|
173
|
+
summary_parts.append(f"0/{total_count} cracked")
|
|
174
|
+
if hashcat_status and hashcat_status != "unknown":
|
|
175
|
+
summary_parts.append(hashcat_status)
|
|
176
|
+
summary = " | ".join(summary_parts) if summary_parts else "No results"
|
|
177
|
+
|
|
178
|
+
return {
|
|
179
|
+
"tool": "hashcat",
|
|
180
|
+
"status": status,
|
|
181
|
+
"summary": summary,
|
|
182
|
+
"cracked_count": len(cracked_list),
|
|
183
|
+
"cracked": cracked_list, # Include cracked list for chaining
|
|
184
|
+
"credentials_added": creds_added,
|
|
185
|
+
"findings_added": findings_added,
|
|
186
|
+
"hashcat_status": hashcat_status,
|
|
187
|
+
}
|
|
188
|
+
|
|
189
|
+
except Exception as e:
|
|
190
|
+
logger.error(f"Error parsing hashcat job: {e}")
|
|
191
|
+
return {"error": str(e)}
|
|
192
|
+
|
|
193
|
+
def display_done(
|
|
194
|
+
self,
|
|
195
|
+
job: Dict[str, Any],
|
|
196
|
+
log_path: str,
|
|
197
|
+
show_all: bool = False,
|
|
198
|
+
show_passwords: bool = False,
|
|
199
|
+
) -> None:
|
|
200
|
+
"""Display successful Hashcat results."""
|
|
201
|
+
try:
|
|
202
|
+
from souleyez.parsers.hashcat_parser import parse_hashcat_output
|
|
203
|
+
|
|
204
|
+
if not log_path or not os.path.exists(log_path):
|
|
205
|
+
return
|
|
206
|
+
|
|
207
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
208
|
+
log_content = f.read()
|
|
209
|
+
|
|
210
|
+
parsed = parse_hashcat_output(log_content)
|
|
211
|
+
|
|
212
|
+
cracked = parsed.get("cracked", [])
|
|
213
|
+
stats = parsed.get("stats", {})
|
|
214
|
+
cracked_count = stats.get("cracked_count", len(cracked))
|
|
215
|
+
total_count = stats.get("total_count", 0)
|
|
216
|
+
potfile_hits = stats.get("potfile_hits", 0)
|
|
217
|
+
status = stats.get("status", "unknown")
|
|
218
|
+
|
|
219
|
+
# Adjust title based on whether we have new cracks or potfile hits
|
|
220
|
+
if cracked:
|
|
221
|
+
title = "HASHCAT RESULTS"
|
|
222
|
+
elif potfile_hits > 0:
|
|
223
|
+
title = "HASHCAT - ALREADY CRACKED"
|
|
224
|
+
else:
|
|
225
|
+
title = "HASHCAT RESULTS"
|
|
226
|
+
|
|
227
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
228
|
+
click.echo(click.style(title, bold=True, fg="green"))
|
|
229
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
230
|
+
click.echo()
|
|
231
|
+
|
|
232
|
+
# Summary
|
|
233
|
+
click.echo(click.style("Summary:", bold=True))
|
|
234
|
+
if total_count > 0:
|
|
235
|
+
click.echo(f" Recovered: {cracked_count}/{total_count}")
|
|
236
|
+
elif cracked_count > 0:
|
|
237
|
+
click.echo(f" Cracked: {cracked_count}")
|
|
238
|
+
if potfile_hits > 0:
|
|
239
|
+
click.echo(f" Already cracked (potfile): {potfile_hits}")
|
|
240
|
+
click.echo(f" Status: {status}")
|
|
241
|
+
click.echo()
|
|
242
|
+
|
|
243
|
+
# Show cracked passwords
|
|
244
|
+
if cracked:
|
|
245
|
+
click.echo(
|
|
246
|
+
click.style(
|
|
247
|
+
f"Cracked Hashes ({len(cracked)}):", bold=True, fg="green"
|
|
248
|
+
)
|
|
249
|
+
)
|
|
250
|
+
max_show = None if show_all else 10
|
|
251
|
+
display_cracked = cracked if max_show is None else cracked[:max_show]
|
|
252
|
+
for c in display_cracked:
|
|
253
|
+
username = c.get("username", "")
|
|
254
|
+
password = c.get("password", "?")
|
|
255
|
+
hash_type = c.get("hash_type", "unknown")
|
|
256
|
+
|
|
257
|
+
if username:
|
|
258
|
+
# Show username:password for Kerberos
|
|
259
|
+
if show_passwords:
|
|
260
|
+
click.echo(
|
|
261
|
+
click.style(
|
|
262
|
+
f" [{hash_type}] {username}:{password}", fg="green"
|
|
263
|
+
)
|
|
264
|
+
)
|
|
265
|
+
else:
|
|
266
|
+
click.echo(
|
|
267
|
+
click.style(
|
|
268
|
+
f" [{hash_type}] {username}:***", fg="green"
|
|
269
|
+
)
|
|
270
|
+
)
|
|
271
|
+
else:
|
|
272
|
+
# Show hash preview for other types
|
|
273
|
+
hash_preview = c.get("hash", "?")[:24] + "..."
|
|
274
|
+
if show_passwords:
|
|
275
|
+
click.echo(
|
|
276
|
+
click.style(
|
|
277
|
+
f" {hash_preview} -> {password}", fg="green"
|
|
278
|
+
)
|
|
279
|
+
)
|
|
280
|
+
else:
|
|
281
|
+
click.echo(
|
|
282
|
+
click.style(f" {hash_preview} -> ***", fg="green")
|
|
283
|
+
)
|
|
284
|
+
if max_show and len(cracked) > max_show:
|
|
285
|
+
click.echo(
|
|
286
|
+
click.style(
|
|
287
|
+
f" ... and {len(cracked) - max_show} more", dim=True
|
|
288
|
+
)
|
|
289
|
+
)
|
|
290
|
+
|
|
291
|
+
# Hint about viewing passwords
|
|
292
|
+
click.echo()
|
|
293
|
+
click.echo(
|
|
294
|
+
click.style(
|
|
295
|
+
" Tip: Use 'souleyez creds list' to view all cracked credentials",
|
|
296
|
+
dim=True,
|
|
297
|
+
)
|
|
298
|
+
)
|
|
299
|
+
elif potfile_hits > 0:
|
|
300
|
+
# No new cracks but potfile hits - show how to view
|
|
301
|
+
click.echo(
|
|
302
|
+
click.style(
|
|
303
|
+
f" {potfile_hits} hash(es) were already cracked in a previous run.",
|
|
304
|
+
fg="green",
|
|
305
|
+
)
|
|
306
|
+
)
|
|
307
|
+
click.echo()
|
|
308
|
+
click.echo(click.style("To view cracked passwords:", bold=True))
|
|
309
|
+
target = job.get("target", "")
|
|
310
|
+
if target:
|
|
311
|
+
click.echo(f" hashcat --show {target}")
|
|
312
|
+
click.echo(" souleyez creds list")
|
|
313
|
+
else:
|
|
314
|
+
click.echo(click.style(" No passwords cracked.", fg="yellow"))
|
|
315
|
+
|
|
316
|
+
click.echo()
|
|
317
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
318
|
+
click.echo()
|
|
319
|
+
|
|
320
|
+
except Exception as e:
|
|
321
|
+
logger.debug(f"Error in display_done: {e}")
|
|
322
|
+
|
|
323
|
+
def display_warning(
|
|
324
|
+
self,
|
|
325
|
+
job: Dict[str, Any],
|
|
326
|
+
log_path: str,
|
|
327
|
+
log_content: Optional[str] = None,
|
|
328
|
+
) -> None:
|
|
329
|
+
"""Display warning status for Hashcat."""
|
|
330
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
331
|
+
click.echo(click.style("[WARNING] HASHCAT", bold=True, fg="yellow"))
|
|
332
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
333
|
+
click.echo()
|
|
334
|
+
click.echo(" Password cracking completed with warnings.")
|
|
335
|
+
click.echo(" Check raw logs for details (press 'r').")
|
|
336
|
+
click.echo()
|
|
337
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
338
|
+
click.echo()
|
|
339
|
+
|
|
340
|
+
def display_error(
|
|
341
|
+
self,
|
|
342
|
+
job: Dict[str, Any],
|
|
343
|
+
log_path: str,
|
|
344
|
+
log_content: Optional[str] = None,
|
|
345
|
+
) -> None:
|
|
346
|
+
"""Display error status for Hashcat."""
|
|
347
|
+
# Read log if not provided
|
|
348
|
+
if log_content is None and log_path and os.path.exists(log_path):
|
|
349
|
+
try:
|
|
350
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
351
|
+
log_content = f.read()
|
|
352
|
+
except Exception:
|
|
353
|
+
log_content = ""
|
|
354
|
+
|
|
355
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
356
|
+
click.echo(click.style("[ERROR] HASHCAT FAILED", bold=True, fg="red"))
|
|
357
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
358
|
+
click.echo()
|
|
359
|
+
|
|
360
|
+
# Check for common hashcat errors
|
|
361
|
+
error_msg = None
|
|
362
|
+
if log_content:
|
|
363
|
+
if "No hashes loaded" in log_content:
|
|
364
|
+
error_msg = "No hashes loaded - check hash file format"
|
|
365
|
+
elif "Token length exception" in log_content:
|
|
366
|
+
error_msg = "Invalid hash format - wrong hash type (-m) specified"
|
|
367
|
+
elif "Cannot find input" in log_content or "No such file" in log_content:
|
|
368
|
+
error_msg = "Hash file or wordlist not found"
|
|
369
|
+
elif "CUDA" in log_content or "OpenCL" in log_content:
|
|
370
|
+
if "error" in log_content.lower():
|
|
371
|
+
error_msg = "GPU driver or OpenCL/CUDA error - check GPU drivers"
|
|
372
|
+
elif "out of memory" in log_content.lower():
|
|
373
|
+
error_msg = "GPU out of memory - try smaller workload (-w)"
|
|
374
|
+
elif "Separator unmatched" in log_content:
|
|
375
|
+
error_msg = "Invalid hash format or separator"
|
|
376
|
+
|
|
377
|
+
if error_msg:
|
|
378
|
+
click.echo(f" {error_msg}")
|
|
379
|
+
else:
|
|
380
|
+
click.echo(
|
|
381
|
+
" Hash cracking failed - check raw logs for details (press 'r')"
|
|
382
|
+
)
|
|
383
|
+
|
|
384
|
+
click.echo()
|
|
385
|
+
click.echo(click.style("=" * 70, fg="red"))
|
|
386
|
+
click.echo()
|
|
387
|
+
|
|
388
|
+
def display_no_results(
|
|
389
|
+
self,
|
|
390
|
+
job: Dict[str, Any],
|
|
391
|
+
log_path: str,
|
|
392
|
+
) -> None:
|
|
393
|
+
"""Display no_results status for Hashcat."""
|
|
394
|
+
# Check if hashes were already cracked (potfile hits)
|
|
395
|
+
potfile_hits = 0
|
|
396
|
+
if log_path and os.path.exists(log_path):
|
|
397
|
+
try:
|
|
398
|
+
with open(log_path, "r", encoding="utf-8", errors="replace") as f:
|
|
399
|
+
log_content = f.read()
|
|
400
|
+
# Count potfile hits
|
|
401
|
+
potfile_hits = log_content.count("Removed hash found as potfile entry")
|
|
402
|
+
# Also check for bulk message
|
|
403
|
+
import re
|
|
404
|
+
|
|
405
|
+
bulk_match = re.search(
|
|
406
|
+
r"Removed (\d+) hash(?:es)? found as potfile entr", log_content
|
|
407
|
+
)
|
|
408
|
+
if bulk_match:
|
|
409
|
+
potfile_hits = int(bulk_match.group(1))
|
|
410
|
+
except Exception:
|
|
411
|
+
pass
|
|
412
|
+
|
|
413
|
+
if potfile_hits > 0:
|
|
414
|
+
# Hashes already cracked - show success message
|
|
415
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
416
|
+
click.echo(click.style("HASHCAT - ALREADY CRACKED", bold=True, fg="green"))
|
|
417
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
418
|
+
click.echo()
|
|
419
|
+
click.echo(f" {potfile_hits} hash(es) already cracked in previous run.")
|
|
420
|
+
click.echo()
|
|
421
|
+
click.echo(click.style("To view cracked passwords:", bold=True))
|
|
422
|
+
target = job.get("target", "")
|
|
423
|
+
if target:
|
|
424
|
+
click.echo(f" hashcat --show {target}")
|
|
425
|
+
click.echo(" souleyez creds list")
|
|
426
|
+
click.echo()
|
|
427
|
+
click.echo(click.style("=" * 70, fg="green"))
|
|
428
|
+
click.echo()
|
|
429
|
+
else:
|
|
430
|
+
# Actually no results
|
|
431
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
432
|
+
click.echo(click.style("HASHCAT RESULTS", bold=True, fg="yellow"))
|
|
433
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
434
|
+
click.echo()
|
|
435
|
+
click.echo(" No passwords cracked.")
|
|
436
|
+
click.echo()
|
|
437
|
+
click.echo(click.style("Suggestions:", dim=True))
|
|
438
|
+
click.echo(" - Try a larger wordlist")
|
|
439
|
+
click.echo(" - Use rules: -r best64.rule or -r dive.rule")
|
|
440
|
+
click.echo(" - Try mask attack: -a 3 ?a?a?a?a?a?a")
|
|
441
|
+
click.echo(" - Verify hash mode is correct: -m HASHTYPE")
|
|
442
|
+
click.echo()
|
|
443
|
+
click.echo(click.style("=" * 70, fg="yellow"))
|
|
444
|
+
click.echo()
|