219 lines
7.6 KiB
Bash
Executable File

#!/bin/bash
#===============================================================================
#
# DIRECTORY:
# /home/*/.local/share/nautilus/scripts/05b_macOS/
# OR
# /home/*/.gnome2/nautilus-sctipts/05b_macOS/ (deprecated)
#
# FILE:
# 03_credentials
#
# USAGE:
# Right klick on an EWF image (.E01) and
# choose this nautilus script from the context menu.
#
# OPTIONS:
# none
#
# DESCRIPTION:
# Shows password hints, configured autoLoginUser and
# recalculated kcpassword (if present).
#
# REQUIREMENTS:
# bash, zenity, sleuthkit, awk, grep, libplist-util, print_plist_entry.py,
# kcpass.py, vim and coreutils
#
# BUGS:
# ---
#
# NOTES:
# Tested on
# - Debian 8+
# - Arch Linux
#
# AUTHOR:
# Patrick Neumann, patrick@neumannsland.de
#
# COMPANY:
# (privately)
#
# VERSION:
# 0.9 (beta)
#
# LINK TO THE MOST CURRENT VERSIONS:
# https://
#
# CREATED:
# 23.03.2016
#
# COPYRIGHT (C):
# 2015-2020 - Patrick Neumann
#
# LICENSE:
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# WARRANTY:
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
# TODO:
# ---
#
# HISTORY:
# 0.9 - Patrick Neumann - Initial (public) release
#===============================================================================
#-------------------------------------------------------------------------------
# Additional supported Distribution(s) (add before Library!).
#-------------------------------------------------------------------------------
SUPPORTED_OSR="arch"
#-------------------------------------------------------------------------------
# Check for library (casualscripter_nautilus-scripts_functions.sh).
#-------------------------------------------------------------------------------
readonly LIBRARY="${0%/*/*}/.casualscripter_nautilus-scripts_functions.sh"
if [ ! -f "${LIBRARY}" ] ; then
zenity --error \
--text \
"ERROR: casualscripter_nautilus-scripts_functions.sh MISSING!"
exit 1
fi
source "${LIBRARY}"
#-------------------------------------------------------------------------------
# Checks (see library "casualscripter_nautilus-scripts_functions.sh").
#-------------------------------------------------------------------------------
check_dep "${AWK_BIN}" "awk"
check_dep "${FLS_BIN}" "sleuthkit"
check_dep "${FSSTAT_BIN}" "sleuthkit"
check_dep "${GREP_BIN}" "grep"
check_dep "${ICAT_BIN}" "sleuthkit"
check_dep "${IFIND_BIN}" "sleuthkit"
check_dep "${MMLS_BIN}" "sleuthkit"
check_dep "${PLUTIL_BIN}" "libplist-utils"
check_dep "${RM_BIN}" "coreutils"
check_dep "${XXD_BIN}" "vim-common"
# https://github.com/casualscripter/mac-osx-forensics
# (forked from https://github.com/moxilo/mac-osx-forensics)
check_dep "${KCPPY_BIN}" "kcpass.py"
# https://raw.githubusercontent.com/casualscripter/debian-stuff
check_dep "${PPEPY_BIN}" "print_plist_entry.py"
# actually only working correct with EWF images!
check_ext "${SOURCE}" "[eE]01"
check_tmp
#-------------------------------------------------------------------------------
# A little bit of configuration before the magic.
#-------------------------------------------------------------------------------
readonly OFFSET="$( choose_partition "${SOURCE}" | ${AWK_BIN} -F "_" '{ print $3; }' )"
readonly CREDENTIALS="${TMP}/${OFFSET}_credentials.txt"
#-------------------------------------------------------------------------------
# The wonder...
#-------------------------------------------------------------------------------
if ${FSSTAT_BIN} -o "${OFFSET}" "${SOURCE}" > /dev/null 2>&1 ; then
(
echo -e -n "Partition (mmls line):\n " >> "${CREDENTIALS}"
${MMLS_BIN} -aM "${SOURCE}" \
| ${AWK_BIN} '$3=="'"${OFFSET}"'" { print $0; }' \
>> "${CREDENTIALS}"
users="$( ${IFIND_BIN} -o "${OFFSET}" \
-n "/private/var/db/dslocal/nodes/Default/users" \
"${SOURCE}" )"
if [ "${users}" != "File not found" ] ; then
echo -e "\n Some contents from the OpenDirectory (users):\n" \
>> "${CREDENTIALS}"
users_ls="$( ${FLS_BIN} -o "${OFFSET}" "${SOURCE}" "${users}" \
| ${GREP_BIN} --extended-regexp \
--invert-match \
".*[[:space:]](Guest|_.*|daemon|nobody|root)\.plist" \
| ${AWK_BIN} '{ sub( /:/, "", $2 ); print $2; }' )"
for user in ${users_ls} ; do
if [ ! -f "${user}.plist" ] ; then
if ! ${ICAT_BIN} -o "${OFFSET}" "${SOURCE}" "${user}" > "/tmp/${user}.plist" ; then
echo " During the execution of icat an error occurred." >> "${CREDENTIALS}"
fi
${PLUTIL_BIN} -i "/tmp/${user}.plist" -o "${DIRNAME}/${user}.plist"
${RM_BIN} "/tmp/${user}.plist"
fi
echo -e -n " " >> "${CREDENTIALS}"
${PPEPY_BIN} "${DIRNAME}/${user}.plist" "name" >> "${CREDENTIALS}"
echo -e -n " " >> "${CREDENTIALS}"
${PPEPY_BIN} "${DIRNAME}/${user}.plist" "hint" >> "${CREDENTIALS}"
echo >> "${CREDENTIALS}"
done
else
echo -e " Directory \"/private/var/db/dslocal/nodes/Default/users\" not found.\n" \
>> "${CREDENTIALS}"
fi
calp="$( ${IFIND_BIN} -o "${OFFSET}" \
-n "/Library/Preferences/com.apple.loginwindow.plist" \
"${SOURCE}" )"
if [ "${calp}" != "File not found" ] ; then
if [ ! -f "${calp}.plist" ] ; then
if ! ${ICAT_BIN} -o "${OFFSET}" "${SOURCE}" "${calp}" > "/tmp/${calp}.plist" ; then
echo " During the execution of icat an error occurred." \
>> "${CREDENTIALS}"
fi
${PLUTIL_BIN} -i "/tmp/${calp}.plist" -o "${DIRNAME}/${calp}.plist"
${RM_BIN} "/tmp/${calp}.plist"
fi
echo -e -n " Some content from com.apple.loginwindow.plist:\n " \
>> "${CREDENTIALS}"
${PPEPY_BIN} "${DIRNAME}/${calp}.plist" "lastUserName" \
>> "${CREDENTIALS}"
echo -e -n " " >> "${CREDENTIALS}"
${PPEPY_BIN} "${DIRNAME}/${calp}.plist" "autoLoginUser" \
>> "${CREDENTIALS}"
echo >> "${CREDENTIALS}"
else
echo -e " File \"/Library/Preferences/com.apple.loginwindow.plist\" not found.\n" \
>> "${CREDENTIALS}"
fi
kcpw="$( ${IFIND_BIN} -o "${OFFSET}" -n "/private/etc/kcpassword" "${SOURCE}" )"
if [ "${kcpw}" != "File not found" ] ; then
echo -e "\nPassword (kcpass.py CREDENTIALS):" >> "${CREDENTIALS}"
if ! ${KCPPY_BIN} "$( ${ICAT_BIN} -o "${OFFSET}" "${SOURCE}" "${kcpw}" \
| ${XXD_BIN} -p )" \
>> "${CREDENTIALS}" ; then
echo "During the execution of kcpass.py an error occurred." \
>> "${CREDENTIALS}"
fi
else
echo -e " File \"/private/etc/kcpassword\" not found.\n" \
>> "${CREDENTIALS}"
fi
) | ${ZENITY_BIN} --progress \
--title="credentials" \
--text="Please wait..." \
--pulsate
else
echo -e " ? (The Sleuth Kit does not support the filesystem!)\n" \
>> "${CREDENTIALS}"
fi
#-------------------------------------------------------------------------------
# Display content of the resultfile "credentials.txt".
#-------------------------------------------------------------------------------
display_resultfile "${CREDENTIALS}"
exit 0