All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.poi.examples.crypt.OOXMLPasswordsTry Maven / Gradle / Ivy

There is a newer version: 5.3.0
Show newest version
/*
 *  ====================================================================
 *    Licensed to the Apache Software Foundation (ASF) under one or more
 *    contributor license agreements.  See the NOTICE file distributed with
 *    this work for additional information regarding copyright ownership.
 *    The ASF licenses this file to You under the Apache License, Version 2.0
 *    (the "License"); you may not use this file except in compliance with
 *    the License.  You may obtain a copy of the License at
 *
 *        http://www.apache.org/licenses/LICENSE-2.0
 *
 *    Unless required by applicable law or agreed to in writing, software
 *    distributed under the License is distributed on an "AS IS" BASIS,
 *    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 *    See the License for the specific language governing permissions and
 *    limitations under the License.
 * ====================================================================
 */

package org.apache.poi.examples.crypt;

import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
import java.security.GeneralSecurityException;
import java.util.Optional;
import java.util.function.Predicate;
import java.util.stream.Stream;

import org.apache.poi.poifs.crypt.Decryptor;
import org.apache.poi.poifs.crypt.EncryptionInfo;
import org.apache.poi.poifs.filesystem.POIFSFileSystem;

/**
 * Tries a list of possible passwords for an OOXML protected file
 *
 * Note that this isn't very fast, and is aimed at when you have
 *  just a few passwords to check.
 * For serious processing, you'd be best off grabbing the hash
 *  out with POI or office2john.py, then running that against
 *  "John The Ripper" or GPU enabled version of "hashcat"
 */
public final class OOXMLPasswordsTry {

    private OOXMLPasswordsTry() {}

    @SuppressWarnings({"java:S106","java:S4823"})
    public static void main(String[] args) throws Exception {
        if (args.length < 2) {
            System.err.println("Use:");
            System.err.println("  OOXMLPasswordsTry  ");
            System.exit(1);
        }
        String ooxml = args[0];
        String words = args[1];

        System.out.println("Trying passwords from " + words + " against " + ooxml);
        System.out.println();

        try (POIFSFileSystem fs = new POIFSFileSystem(new File(ooxml), true)) {
            EncryptionInfo info = new EncryptionInfo(fs);
            Decryptor d = Decryptor.getInstance(info);

            final long start = System.currentTimeMillis();
            final int[] count = { 0 };
            Predicate counter = s -> {
                if (++count[0] % 1000 == 0) {
                    int secs = (int) ((System.currentTimeMillis() - start) / 1000);
                    System.out.println("Done " + count[0] + " passwords, " + secs + " seconds, last password " + s);
                }
                return true;
            };

            // Try each password in turn, reporting progress
            try (Stream lines = Files.lines(Paths.get(words))) {
                Optional found = lines.filter(counter).filter(w -> isValid(d, w)).findFirst();
                System.out.println(found.map(s -> "Password found: " + s).orElse("Error - No password matched"));
            }
        }
    }

    private static boolean isValid(Decryptor dec, String password) {
        try {
            return dec.verifyPassword(password);
        } catch (GeneralSecurityException e) {
            return false;
        }
    }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy