__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
import binascii
import hashlib
import cryptography.exceptions
from cryptography.exceptions import UnsupportedAlgorithm
from cryptography.hazmat.primitives import constant_time, serialization
from cryptography.hazmat.primitives.asymmetric.x25519 import (
X25519PrivateKey,
X25519PublicKey,
)
from paramiko.message import Message
from paramiko.common import byte_chr
from paramiko.ssh_exception import SSHException
_MSG_KEXECDH_INIT, _MSG_KEXECDH_REPLY = range(30, 32)
c_MSG_KEXECDH_INIT, c_MSG_KEXECDH_REPLY = [byte_chr(c) for c in range(30, 32)]
class KexCurve25519:
hash_algo = hashlib.sha256
def __init__(self, transport):
self.transport = transport
self.key = None
@classmethod
def is_available(cls):
try:
X25519PrivateKey.generate()
except UnsupportedAlgorithm:
return False
except cryptography.exceptions.InternalError:
return False
else:
return True
def _perform_exchange(self, peer_key):
secret = self.key.exchange(peer_key)
if constant_time.bytes_eq(secret, b"\x00" * 32):
raise SSHException(
"peer's curve25519 public value has wrong order"
)
return secret
def start_kex(self):
self.key = X25519PrivateKey.generate()
if self.transport.server_mode:
self.transport._expect_packet(_MSG_KEXECDH_INIT)
return
m = Message()
m.add_byte(c_MSG_KEXECDH_INIT)
m.add_string(
self.key.public_key().public_bytes(
serialization.Encoding.Raw, serialization.PublicFormat.Raw
)
)
self.transport._send_message(m)
self.transport._expect_packet(_MSG_KEXECDH_REPLY)
def parse_next(self, ptype, m):
if self.transport.server_mode and (ptype == _MSG_KEXECDH_INIT):
return self._parse_kexecdh_init(m)
elif not self.transport.server_mode and (ptype == _MSG_KEXECDH_REPLY):
return self._parse_kexecdh_reply(m)
raise SSHException(
"KexCurve25519 asked to handle packet type {:d}".format(ptype)
)
def _parse_kexecdh_init(self, m):
peer_key_bytes = m.get_string()
peer_key = X25519PublicKey.from_public_bytes(peer_key_bytes)
K = self._perform_exchange(peer_key)
K = int(binascii.hexlify(K), 16)
# compute exchange hash
hm = Message()
hm.add(
self.transport.remote_version,
self.transport.local_version,
self.transport.remote_kex_init,
self.transport.local_kex_init,
)
server_key_bytes = self.transport.get_server_key().asbytes()
exchange_key_bytes = self.key.public_key().public_bytes(
serialization.Encoding.Raw, serialization.PublicFormat.Raw
)
hm.add_string(server_key_bytes)
hm.add_string(peer_key_bytes)
hm.add_string(exchange_key_bytes)
hm.add_mpint(K)
H = self.hash_algo(hm.asbytes()).digest()
self.transport._set_K_H(K, H)
sig = self.transport.get_server_key().sign_ssh_data(
H, self.transport.host_key_type
)
# construct reply
m = Message()
m.add_byte(c_MSG_KEXECDH_REPLY)
m.add_string(server_key_bytes)
m.add_string(exchange_key_bytes)
m.add_string(sig)
self.transport._send_message(m)
self.transport._activate_outbound()
def _parse_kexecdh_reply(self, m):
peer_host_key_bytes = m.get_string()
peer_key_bytes = m.get_string()
sig = m.get_binary()
peer_key = X25519PublicKey.from_public_bytes(peer_key_bytes)
K = self._perform_exchange(peer_key)
K = int(binascii.hexlify(K), 16)
# compute exchange hash and verify signature
hm = Message()
hm.add(
self.transport.local_version,
self.transport.remote_version,
self.transport.local_kex_init,
self.transport.remote_kex_init,
)
hm.add_string(peer_host_key_bytes)
hm.add_string(
self.key.public_key().public_bytes(
serialization.Encoding.Raw, serialization.PublicFormat.Raw
)
)
hm.add_string(peer_key_bytes)
hm.add_mpint(K)
self.transport._set_K_H(K, self.hash_algo(hm.asbytes()).digest())
self.transport._verify_key(peer_host_key_bytes, sig)
self.transport._activate_outbound()
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| __pycache__ | Folder | 0755 |
|
|
| __init__.py | File | 4.34 KB | 0644 |
|
| _version.py | File | 80 B | 0644 |
|
| _winapi.py | File | 10.94 KB | 0644 |
|
| agent.py | File | 15.5 KB | 0644 |
|
| auth_handler.py | File | 42 KB | 0644 |
|
| auth_strategy.py | File | 11.17 KB | 0644 |
|
| ber.py | File | 4.27 KB | 0644 |
|
| buffered_pipe.py | File | 7.06 KB | 0644 |
|
| channel.py | File | 48.07 KB | 0644 |
|
| client.py | File | 33.68 KB | 0644 |
|
| common.py | File | 7.57 KB | 0644 |
|
| compress.py | File | 1.25 KB | 0644 |
|
| config.py | File | 26.72 KB | 0644 |
|
| dsskey.py | File | 8.05 KB | 0644 |
|
| ecdsakey.py | File | 11.38 KB | 0644 |
|
| ed25519key.py | File | 7.39 KB | 0644 |
|
| file.py | File | 18.62 KB | 0644 |
|
| hostkeys.py | File | 12.92 KB | 0644 |
|
| kex_curve25519.py | File | 4.44 KB | 0644 |
|
| kex_ecdh_nist.py | File | 4.89 KB | 0644 |
|
| kex_gex.py | File | 10.08 KB | 0644 |
|
| kex_group1.py | File | 5.61 KB | 0644 |
|
| kex_group14.py | File | 1.79 KB | 0644 |
|
| kex_group16.py | File | 2.23 KB | 0644 |
|
| kex_gss.py | File | 23.99 KB | 0644 |
|
| message.py | File | 9.13 KB | 0644 |
|
| packet.py | File | 23.74 KB | 0644 |
|
| pipe.py | File | 3.81 KB | 0644 |
|
| pkey.py | File | 35.99 KB | 0644 |
|
| primes.py | File | 4.99 KB | 0644 |
|
| proxy.py | File | 4.54 KB | 0644 |
|
| rsakey.py | File | 7.37 KB | 0644 |
|
| server.py | File | 29.74 KB | 0644 |
|
| sftp.py | File | 6.32 KB | 0644 |
|
| sftp_attr.py | File | 8.06 KB | 0644 |
|
| sftp_client.py | File | 35.01 KB | 0644 |
|
| sftp_file.py | File | 21.31 KB | 0644 |
|
| sftp_handle.py | File | 7.25 KB | 0644 |
|
| sftp_server.py | File | 19.04 KB | 0644 |
|
| sftp_si.py | File | 12.25 KB | 0644 |
|
| ssh_exception.py | File | 7.32 KB | 0644 |
|
| ssh_gss.py | File | 28.21 KB | 0644 |
|
| transport.py | File | 132.45 KB | 0644 |
|
| util.py | File | 9.33 KB | 0644 |
|
| win_openssh.py | File | 1.87 KB | 0644 |
|
| win_pageant.py | File | 4.08 KB | 0644 |
|