Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- def Break_auth_XMPP_test() :
- #Details du client :
- Username = "user"
- password = "pencil"
- #Le client génére le random Nonce : fyko+d2lbbFgONRv9qkxdawL
- # Message envoyé par le client : n,,n=user,r=fyko+d2lbbFgONRv9qkxdawL
- ClientNonce = "fyko+d2lbbFgONRv9qkxdawL"
- #Le serveur génére le Nonce : 3rfcNHYJY1ZVvWVs7j
- #Message envoyé par le serveur : r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,s=QSXCR+Q6sek8bf92,i=4096
- NonceServeur = "fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j"
- #On decode le Salt et l'encode en hex ca donne :
- salt = "4125c247e43ab1e93c6dff76"
- #Client final message bare: c=biws,r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j
- # Calcul du salted password : saltedPassword = PBKDF2-SHA-1(normalizedPassword, Salt, i)
- normalizedPassword = bytes(password,'UTF-8')
- salt = bytes(salt,'UTF-8')
- saltedPassword = hashlib.pbkdf2_hmac('sha1',normalizedPassword , salt, 4096)
- saltedPassword = binascii.hexlify(saltedPassword)
- print ("le salted Password est : "+str(saltedPassword)+"")
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement