CN111104693A - Android platform software data cracking method, terminal device and storage medium - Google Patents

Android platform software data cracking method, terminal device and storage medium Download PDF

Info

Publication number
CN111104693A
CN111104693A CN201911367937.1A CN201911367937A CN111104693A CN 111104693 A CN111104693 A CN 111104693A CN 201911367937 A CN201911367937 A CN 201911367937A CN 111104693 A CN111104693 A CN 111104693A
Authority
CN
China
Prior art keywords
software
key
cracked
file
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201911367937.1A
Other languages
Chinese (zh)
Inventor
曹飞
李哲
张磊
畅斌
张辉极
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Meiya Qin'an Information Technology Co Ltd
Original Assignee
Shaanxi Meiya Qin'an Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Meiya Qin'an Information Technology Co Ltd filed Critical Shaanxi Meiya Qin'an Information Technology Co Ltd
Priority to CN201911367937.1A priority Critical patent/CN111104693A/en
Publication of CN111104693A publication Critical patent/CN111104693A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention relates to an Android platform software data cracking method, terminal equipment and a storage medium, wherein the method comprises the following steps: s1: performing reverse processing on software to be cracked to obtain a Default KDF iter and a Default Page Size; s2: building simulation software, copying a key file corresponding to the software to be cracked, and modifying the UID in the copied key file into the UID corresponding to the simulation software to be used as the key file of the simulation software; s3: reading the key file through simulation software to generate a key object in a Cipher parameter; s4: acquiring contents corresponding to the parameters data and IV; s5: decrypting the content of the parameter data through a decryption algorithm, a key object and an IV value corresponding to software to be decrypted which are contained in the Cipher parameter to obtain a value of a parameter key; s6: and decrypting the software to be cracked according to the three parameters of the Default KDF iter, the Default Page Size and the key. The method and the device read the key file of the software to be cracked by constructing the simulation software, realize the acquisition of the cracked key and finally realize the cracking of the database file.

Description

Android platform software data cracking method, terminal device and storage medium
Technical Field
The invention relates to the field of data cracking, in particular to a method for cracking Android platform software data, terminal equipment and a storage medium.
Background
Signal is application software developed by Open Whisper Systems company, and is used for integrally encrypting database files by adopting an AES-256-CBC encryption algorithm.
Although the higher information security is favored by users, the Signal communication information is often needed to be analyzed in case detection, and the higher data protection capability of the case detection causes certain difficulty in case evidence collection work.
Disclosure of Invention
In order to solve the problems, the invention provides an Android platform software data cracking method, terminal equipment and a storage medium.
The specific scheme is as follows:
a method for breaking Android platform software data comprises the following steps:
s1: carrying out reverse processing on a database file of the software to be cracked to obtain values of corresponding parameters Default KDFiter and Default Page Size;
s2: building simulation software, copying a key file corresponding to the software to be cracked, and modifying the UID in the copied key file into the UID corresponding to the simulation software to be used as the key file of the simulation software;
s3: reading the key file through simulation software to generate a key object in a Cipher parameter;
s4: the simulation software opens a configuration file corresponding to the software to be cracked, and obtains the contents corresponding to the parameters data and IV;
s5: the simulation software decrypts the content of the parameter data through a decryption algorithm, a key object and an IV value corresponding to the software to be decrypted, which are contained in the Cipher parameter, so as to obtain a value of the parameter key, and converts the value into a character string format;
s6: and decrypting the database file of the software to be cracked according to the three parameters of the Default KDF iter, the Default Page Size and the key.
Further, the software to be cracked is Signal software.
Further, the decryption algorithm is an AES-GCM algorithm.
The Android platform software data cracking terminal device comprises a processor, a memory and a computer program which is stored in the memory and can run on the processor, wherein the steps of the method of the embodiment of the invention are realized when the processor executes the computer program.
A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to an embodiment of the invention as described above.
According to the technical scheme, under the Android KeyStore safety mechanism, the key file of the software to be cracked is read by constructing simulation software, so that the cracked key is obtained, the cracking of the database file is finally realized, and the help is provided for the evidence obtaining work.
Drawings
Fig. 1 is a flowchart illustrating a first embodiment of the present invention.
Fig. 2 is a schematic code diagram after software reverse processing in this embodiment.
Detailed Description
To further illustrate the various embodiments, the invention provides the accompanying drawings. The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the embodiments. Those skilled in the art will appreciate still other possible embodiments and advantages of the present invention with reference to these figures.
The invention will now be further described with reference to the accompanying drawings and detailed description.
The first embodiment is as follows:
in this embodiment, Signal software is taken as an example for explanation, and a data cracking method for Android platform software is provided, as shown in fig. 1, the method includes the following steps:
s1: and performing reverse processing on a database file of the Signal software, and obtaining corresponding parameters Default KDF iter and Default Page Size from the code, wherein the Default KDF iter represents iteration times, and the DefaultPage Size represents Page Size.
Db, wherein the database file of the Signal software is signal.db, and an AES-256-CBC encryption algorithm is adopted in the encryption process, so that three variable parameters, namely Default KDF iter, Default PageSize and key, corresponding to the database file need to be determined for cracking the database file, and the rest parameters can adopt Default parameters.
As shown in FIG. 2, the value of the parameter Default KDF iter is 1 and the value of Default Page Size is 4096.
S2: and constructing simulation software, copying the key file corresponding to the Signal software, and modifying the UID corresponding to the Signal software in the copied key file into the UID corresponding to the simulation software to be used as the key file of the simulation software.
In the security mechanism of the Android KeyStore, each software has a unique key namespace, so that keys of different software are different, and a key file (secret key file) of each software is stored in a/data/misc/KeyStore/user _ x/directory of the Android system, such as the key file 10123_ USRPKEY _ MyKey, wherein "10123" is a UID corresponding to the software, and "MyKey" is an alias (alias) of the key.
Since the installation file of each piece of software already determines the unique UID corresponding to the piece of software when the installation file is installed, the Android KeyStore security mechanism is fooled by copying the key file and modifying the UID therein.
Since the operation needs root authority, the method in the embodiment is only suitable for root Android devices.
S3: and reading the key file through simulation software to generate a key object in the Cipher parameter.
Cipher is a class in java that is used to provide cryptographic functionality for encryption and decryption. It forms the core of the JavaCryptographic Extension (JCE) framework.
Parameters corresponding to Cipher include a decryption algorithm, a key object, and an IV value.
S4: and the simulation software opens a configuration file (XML file) corresponding to the Signal software and acquires the contents corresponding to the parameters data and IV.
In this embodiment, the contents corresponding to the parameters data and IV are stored in the location corresponding to the node name of the configuration file, "pref _ database _ encrypted _ secret," in the format of json, and the data and IV values are obtained by searching the node.
S5: the simulation software decrypts the content of the parameter data through a decryption algorithm, a key object and an IV value corresponding to Signal software contained in the Cipher parameter to obtain a value of the parameter key, and converts the value into a character string format.
The decryption algorithm in this embodiment is the AES-GCM algorithm.
Since the decrypted key value is in binary format, it needs to be converted into a string format.
S6: and decrypting the database file Signal.db of the Signal software according to the three parameters of the Default KDF iter, the Default Page Size and the key.
After decryption, the database tool DB Browser for SQLite can be used for reading the content of the database file Signal.db.
The embodiment of the invention provides an Android platform software data cracking method, which is characterized in that under an Android KeyStore safety mechanism, a key file of Signal software is read by constructing simulation software, so that a cracking key is obtained, cracking of a database file is finally realized, and help is provided for evidence obtaining work.
Example two:
the invention also provides Android platform software data cracking terminal equipment which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the steps in the method embodiment of the first embodiment of the invention are realized when the processor executes the computer program.
Further, as an executable scheme, the Android platform software data destruction terminal device may be a desktop computer, a notebook, a mobile phone, a cloud server, and other computing devices. The Android platform software data cracking terminal equipment can comprise, but is not limited to, a processor and a memory. Those skilled in the art can understand that the composition structure of the Android platform software data cracking terminal device is only an example of the Android platform software data cracking terminal device, and does not constitute a limitation on the Android platform software data cracking terminal device, and the Android platform software data cracking terminal device may include more or less components than the above, or combine some components, or different components, for example, the Android platform software data cracking terminal device may further include an input/output device, a network access device, a bus, and the like, which is not limited in the embodiments of the present invention.
Further, as an executable solution, the processor may be a Central Processing Unit (CPU), other general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, a discrete hardware component, and the like. The general processor can be a microprocessor or the processor can also be any conventional processor and the like, the processor is a control center of the Android platform software data cracking terminal device, and various interfaces and lines are used for connecting all parts of the whole Android platform software data cracking terminal device.
The memory can be used for storing the computer program and/or the module, and the processor realizes various functions of the Android platform software data cracking terminal device by running or executing the computer program and/or the module stored in the memory and calling data stored in the memory. The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system and an application program required by at least one function; the storage data area may store data created according to the use of the mobile phone, and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The invention also provides a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the above-mentioned method of an embodiment of the invention.
If the module/unit integrated with the Android platform software data cracking terminal device is realized in the form of a software functional unit and is sold or used as an independent product, the module/unit can be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM ), Random Access Memory (RAM), software distribution medium, and the like.
While the invention has been particularly shown and described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (5)

1. A method for breaking Android platform software data is characterized by comprising the following steps:
s1: carrying out reverse processing on a database file of the software to be cracked to obtain values of corresponding parameters Default KDF iter and Default Page Size;
s2: building simulation software, copying a key file corresponding to the software to be cracked, and modifying the UID in the copied key file into the UID corresponding to the simulation software to be used as the key file of the simulation software;
s3: reading the key file through simulation software to generate a key object in a Cipher parameter;
s4: the simulation software opens a configuration file corresponding to the software to be cracked, and obtains the contents corresponding to the parameters data and IV;
s5: the simulation software decrypts the content of the parameter data through a decryption algorithm, a key object and an IV value corresponding to the software to be decrypted, which are contained in the Cipher parameter, so as to obtain a value of the parameter key, and converts the value into a character string format;
s6: and decrypting the database file of the software to be cracked according to the three parameters of the Default KDF iter, the Default Page Size and the key.
2. The Android platform software data destruction method according to claim 1, characterized in that: the software to be cracked is Signal software.
3. The Android platform software data destruction method according to claim 1, characterized in that: the decryption algorithm is an AES-GCM algorithm.
4. The Android platform software data cracking terminal equipment is characterized in that: comprising a processor, a memory and a computer program stored in the memory and running on the processor, the processor implementing the steps of the method according to any one of claims 1 to 3 when executing the computer program.
5. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 3.
CN201911367937.1A 2019-12-26 2019-12-26 Android platform software data cracking method, terminal device and storage medium Withdrawn CN111104693A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911367937.1A CN111104693A (en) 2019-12-26 2019-12-26 Android platform software data cracking method, terminal device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911367937.1A CN111104693A (en) 2019-12-26 2019-12-26 Android platform software data cracking method, terminal device and storage medium

Publications (1)

Publication Number Publication Date
CN111104693A true CN111104693A (en) 2020-05-05

Family

ID=70423306

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911367937.1A Withdrawn CN111104693A (en) 2019-12-26 2019-12-26 Android platform software data cracking method, terminal device and storage medium

Country Status (1)

Country Link
CN (1) CN111104693A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112738079A (en) * 2020-12-28 2021-04-30 厦门市美亚柏科信息股份有限公司 Cross-platform APP data decryption method and system
CN113407924A (en) * 2021-06-01 2021-09-17 厦门市美亚柏科信息股份有限公司 Barrier-free service-based application lock opening method, terminal device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701829A (en) * 2014-01-03 2014-04-02 厦门市美亚柏科信息股份有限公司 Method of off-line analyzing DPAPI (Data Protection Application Programming Interface) enciphered data
US20150121088A1 (en) * 2013-10-30 2015-04-30 Lsi Corporation Method of managing aligned and unaligned data bands in a self encrypting solid state drive
CN106788999A (en) * 2016-12-09 2017-05-31 武汉中软通证信息技术有限公司 A kind of wechat evidence collecting method and system based on data collision
CN107135078A (en) * 2017-06-05 2017-09-05 浙江大学 PBKDF2 cryptographic algorithms accelerated method and equipment therefor
CN108268801A (en) * 2018-01-19 2018-07-10 电子科技大学 Xilinx FPGA based on reverse-engineering consolidate core IP crack methods
CN105095513B (en) * 2015-09-09 2018-07-31 浪潮(北京)电子信息产业有限公司 A kind of method and apparatus cracking oracle database account password
CN109583217A (en) * 2018-11-21 2019-04-05 深圳市易讯天空网络技术有限公司 A kind of encryption of internet electric business platform user private data and decryption method
CN110046477A (en) * 2019-04-04 2019-07-23 上海望友信息科技有限公司 Industrial application software verification authorization method, system, medium, client/server-side

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150121088A1 (en) * 2013-10-30 2015-04-30 Lsi Corporation Method of managing aligned and unaligned data bands in a self encrypting solid state drive
CN103701829A (en) * 2014-01-03 2014-04-02 厦门市美亚柏科信息股份有限公司 Method of off-line analyzing DPAPI (Data Protection Application Programming Interface) enciphered data
CN105095513B (en) * 2015-09-09 2018-07-31 浪潮(北京)电子信息产业有限公司 A kind of method and apparatus cracking oracle database account password
CN106788999A (en) * 2016-12-09 2017-05-31 武汉中软通证信息技术有限公司 A kind of wechat evidence collecting method and system based on data collision
CN107135078A (en) * 2017-06-05 2017-09-05 浙江大学 PBKDF2 cryptographic algorithms accelerated method and equipment therefor
CN108268801A (en) * 2018-01-19 2018-07-10 电子科技大学 Xilinx FPGA based on reverse-engineering consolidate core IP crack methods
CN109583217A (en) * 2018-11-21 2019-04-05 深圳市易讯天空网络技术有限公司 A kind of encryption of internet electric business platform user private data and decryption method
CN110046477A (en) * 2019-04-04 2019-07-23 上海望友信息科技有限公司 Industrial application software verification authorization method, system, medium, client/server-side

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WENJIAN LUO 等: "Authentication by Encrypted Negative Password", 《 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 》 *
李玲双: "加密文档破解系统的设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112738079A (en) * 2020-12-28 2021-04-30 厦门市美亚柏科信息股份有限公司 Cross-platform APP data decryption method and system
CN113407924A (en) * 2021-06-01 2021-09-17 厦门市美亚柏科信息股份有限公司 Barrier-free service-based application lock opening method, terminal device and storage medium

Similar Documents

Publication Publication Date Title
CN111885024B (en) Login information processing method and equipment
US10484352B2 (en) Data operations using a proxy encryption key
US8473740B2 (en) Method and system for secured management of online XML document services through structure-preserving asymmetric encryption
CN108063756B (en) Key management method, device and equipment
CN111741028B (en) Service processing method, device, equipment and system
US8769302B2 (en) Encrypting data and characterization data that describes valid contents of a column
CN112016120A (en) Event prediction method and device based on user privacy protection
CN111132150A (en) Method and device for protecting data, storage medium and electronic equipment
US11604740B2 (en) Obfuscating cryptographic material in memory
Park et al. Research on Note-Taking Apps with Security Features.
CN113792297A (en) Service processing method, device and equipment
CN111104693A (en) Android platform software data cracking method, terminal device and storage medium
CN116522358A (en) Data encryption method, device, computing equipment and storage medium
Park et al. A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system
CN112800467B (en) Online model training method, device and equipment based on data privacy protection
CN114398623A (en) Method for determining security policy
CN113282959A (en) Service data processing method and device and electronic equipment
CN111984989A (en) Method, device, system and medium for verifying, issuing and accessing URL (uniform resource locator)
CN111143879A (en) Android platform SD card file protection method, terminal device and storage medium
US8144876B2 (en) Validating encrypted archive keys with MAC value
CN112307449B (en) Authority hierarchical management method, device, electronic equipment and readable storage medium
CN115758432A (en) Omnibearing data encryption method and system based on machine learning algorithm
CN115098877A (en) File encryption and decryption method and device, electronic equipment and medium
CN110516468B (en) Method and device for encrypting memory snapshot of virtual machine
CN101112040B (en) Method for protection of a digital rights file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20200505

WW01 Invention patent application withdrawn after publication