#!/bin/bash
#===============================================================================
#
# DIRECTORY:
#   /home/*/.local/share/nautilus/scripts/05a-Windows/
# OR
#   /home/*/.gnome2/nautilus-sctipts/05a-Windows/ (deprecated)
#
# FILE:
#   07b-pwdump-hashcat-brute-force
#
# USAGE:
#   Right click on a ?-pwdump-txt and
#   choose this nautilus script from the context menu.
#
# OPTIONS:
#   none
#
# DESCRIPTION:
#   Starts hashcat with a brute force attack on the choosen pwdump file.
#
# REQUIREMENTS:
#   bash, zenity, coreutils, procps and hashcat
#
# BUGS:
#   ---
#
# NOTES:
#   Tested on
#   - Debian 8+
#   - Arch Linux
#
# AUTHOR:
#   Patrick Neumann, patrick@neumannsland.de
#
# COMPANY:
#   (privately)
#
# VERSION:
#   0.9 (beta)
#
# LINK TO THE MOST CURRENT VERSIONS:
#   https://...
#
# CREATED:
#   21.03.2020
#
# COPYRIGHT (C):
#   2015-2020 - Patrick Neumann
#
# LICENSE:
#   This program is free software: you can redistribute it and/or modify
#   it under the terms of the GNU General Public License as published by
#   the Free Software Foundation, either version 3 of the License, or
#   (at your option) any later version.
#
# WARRANTY:
#   This program is distributed in the hope that it will be useful,
#   but WITHOUT ANY WARRANTY; without even the implied warranty of
#   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
#   GNU General Public License for more details.
#
#   You should have received a copy of the GNU General Public License
#   along with this program. If not, see <http://www.gnu.org/licenses/>.
#
# TODO:
#   ----
#
# HISTORY:
#   0.9 - Patrick Neumann - Initial (public) release
#
#===============================================================================

#-------------------------------------------------------------------------------
# Additional supported Distribution(s) (add before Library!).
#-------------------------------------------------------------------------------
# fred-report-templates have to be copied manually to!
SUPPORTED_OSR="arch"

#-------------------------------------------------------------------------------
# Check for library (casualscripter_nautilus-scripts_functions.sh).
#-------------------------------------------------------------------------------
readonly LIBRARY="${0%/*/*}/.casualscripter_nautilus-scripts_functions.sh"
if [ ! -f "${LIBRARY}" ] ; then
  zenity --error \
         --text \
         "ERROR: casualscripter_nautilus-scripts_functions.sh MISSING!"
  exit 1
fi

source "${LIBRARY}"

#-------------------------------------------------------------------------------
# Checks (see library "casualscripter_nautilus-scripts_functions.sh").
#-------------------------------------------------------------------------------
check_dep "${CUT_BIN}" "coreutils"
check_dep "${PGREP_BIN}" "procps"
check_dep "${HASHCAT_BIN}" "hashcat"

check_ext "${SOURCE}" "txt"

#-------------------------------------------------------------------------------
# A little bit of configuration before the magic.
#-------------------------------------------------------------------------------
readonly HASHCAT="${DIRNAME}/$( ${BASENAME_BIN} "${SOURCE}" )-hashcat-brute-force.txt"

readonly NTLM="${DIRNAME}/$( ${BASENAME_BIN} "${SOURCE}" )-ntlm.txt"
if ! [ -f "${NTLM}"  ] ; then
  ${CUT_BIN} -d ":" -f 4 "${SOURCE}" > "${NTLM}"
fi

#-------------------------------------------------------------------------------
# Select pattern.
#-------------------------------------------------------------------------------
readonly PATTERN="$( ${ZENITY_BIN} --list \
                                   --text "Please select pattern!" \
                                   --radiolist \
                                   --column "" \
                                   --column "Patterns:" TRUE "?a?a?a?a?a" \
                                                        FALSE "?a?a?a?a?a?a" \
                                                        FALSE "?l?l?l?l?l?l?l" \
                                                        FALSE "?u?u?u?u?u?u?u" \
                                                        FALSE "?d?d?d?d?d?d?d?d" \
                                   --width="240" \
                                   --height="280" )"

#-------------------------------------------------------------------------------
# ...
# We need force if we use an intel GPU with "broken" OpenCL!
#-------------------------------------------------------------------------------
if [ ! -f "${HASHCAT}" ] ; then
  ${GTERMINAL_BIN} --hide-menubar -- \
    ${HASHCAT_BIN} \
    --potfile-disable \
    --hash-type 1000 \
    --attack-mode 3 \
    --increment \
    --workload-profile 3 \
    --optimized-kernel-enable \
    --force \
    --outfile "${HASHCAT}" \
    "${NTLM}" \
    "${PATTERN}"

  ${SLEEP_BIN} 3

  # We have to wait until ewfverify has finished...
  while ${PGREP_BIN} --full "${HASHCAT_BIN}" > /dev/null 2>&1; do
    ${SLEEP_BIN} 1
  done
fi

#-------------------------------------------------------------------------------
# Display content of the resultfile "hashcat.txt".
#-------------------------------------------------------------------------------
display_resultfile "${HASHCAT}"

exit 0