kobackupdec/kobackupdec.py
lp4n6 67caeb1c73
Update kobackupdec.py
Two (obvious) typos to correct.
2019-12-12 08:20:25 +01:00

621 lines
21 KiB
Python

#!/usr/bin/python3
# -*- coding: utf-8 -*-
#
# Huawei KoBackup backups decryptor.
#
# Version History
# - 20190729: first public release
#
# Released under MIT License
#
# Copyright (c) 2019 Francesco "dfirfpi" Picasso, Reality Net System Solutions
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
# furnished to do so, subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included in
# all copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
# SOFTWARE.
#
'''Huawei KoBackup decryptor.'''
import argparse
import binascii
import io
import logging
import os
import os.path
import pathlib
import sys
import tarfile
import xml.dom.minidom
from Crypto.Cipher import AES
from Crypto.Hash import SHA256
from Crypto.Hash import HMAC
from Crypto.Protocol.KDF import PBKDF2
from Crypto.Util import Counter
VERSION = '20190729'
# Disabling check on doc strings and naming convention.
# pylint: disable=C0111,C0103
# --- DecryptMaterial ---------------------------------------------------------
class DecryptMaterial:
def __init__(self, type_name):
self._type_name = type_name
self._name = None
self._encMsgV3 = None
self._iv = None
self._filepath = None
@property
def type_name(self):
return self._type_name
@property
def name(self):
return self._name
@name.setter
def name(self, value_string):
if value_string:
self._name = value_string
else:
logging.error('empty entry name!')
@property
def encMsgV3(self):
return self._encMsgV3
@encMsgV3.setter
def encMsgV3(self, value_hex_string):
if value_hex_string:
self._encMsgV3 = binascii.unhexlify(value_hex_string)
if len(self._encMsgV3) != 48:
logging.error('encMsgV3 should be 48 bytes long!')
@property
def iv(self):
return self._iv
@iv.setter
def iv(self, value_hex_string):
if value_hex_string:
self._iv = binascii.unhexlify(value_hex_string)
if len(self._iv) != 16:
logging.error('iv should be 16 bytes long!')
@property
def path(self):
return self._filepath
@path.setter
def path(self, value_string):
if value_string:
self._filepath = value_string
else:
logging.error('empty file path!')
def do_check(self):
if self._name and (self._encMsgV3 or self._iv):
return True
return False
# --- Decryptor ---------------------------------------------------------------
class Decryptor:
count = 5000
dklen = 32
def __init__(self, password):
self._upwd = password
self._good = False
self._e_perbackupkey = None
self._pwkey_salt = None
self._type_attch = 0
self._checkMsg = None
self._bkey = None
self._bkey_sha256 = None
@property
def good(self):
return self._good
@property
def e_perbackupkey(self):
return self._e_perbackupkey
@e_perbackupkey.setter
def e_perbackupkey(self, value_hex_string):
if value_hex_string:
self._e_perbackupkey = binascii.unhexlify(value_hex_string)
if len(self._e_perbackupkey) != 48:
logging.error('e_perbackupkey should be 48 bytes long!')
@property
def pwkey_salt(self):
return self._pwkey_salt
@pwkey_salt.setter
def pwkey_salt(self, value_hex_string):
if value_hex_string:
self._pwkey_salt = binascii.unhexlify(value_hex_string)
if len(self._pwkey_salt) != 32:
logging.error('pwkey_salt should be 32 bytes long!')
@property
def type_attch(self):
return self._type_attch
@type_attch.setter
def type_attch(self, value_int):
self._type_attch = value_int
@property
def checkMsg(self):
return self._checkMsg
@checkMsg.setter
def checkMsg(self, value_hex_string):
if value_hex_string:
self._checkMsg = binascii.unhexlify(value_hex_string)
if len(self._checkMsg) != 64:
logging.error('checkMsg should be 64 bytes long!')
@staticmethod
def prf(p, s):
return HMAC.new(p, s, SHA256).digest()
def __decrypt_bkey_v4(self):
key_salt = self._pwkey_salt[:16]
logging.debug('KEY_SALT[%s] = %s', len(key_salt),
binascii.hexlify(key_salt))
key = PBKDF2(self._upwd, key_salt, Decryptor.dklen, Decryptor.count,
Decryptor.prf)
logging.debug('KEY[%s] = %s', len(key), binascii.hexlify(key))
nonce = self._pwkey_salt[16:]
logging.debug('KEY NONCE[%s] = %s', len(nonce),
binascii.hexlify(nonce))
cipher = AES.new(key, mode=AES.MODE_GCM, nonce=nonce)
self._bkey = cipher.decrypt(self._e_perbackupkey)[:32]
logging.debug('BKEY[%s] = %s',
len(self._bkey), binascii.hexlify(self._bkey))
def crypto_init(self):
if self._good:
logging.info('crypto_init: already done with success!')
return
if self._type_attch != 3:
logging.error('crypto_init: type_attch *should be* 3!')
return
if self._e_perbackupkey and self._pwkey_salt:
logging.debug('crypto_init: using version 4.')
self.__decrypt_bkey_v4()
else:
logging.debug('crypto_init: using version 3.')
self._bkey = self._upwd
self._bkey_sha256 = SHA256.new(self._bkey).digest()[:16]
logging.debug('SHA256(BKEY)[%s] = %s', len(self._bkey_sha256),
binascii.hexlify(self._bkey_sha256))
salt = self._checkMsg[32:]
logging.debug('SALT[%s] = %s', len(salt), binascii.hexlify(salt))
res = PBKDF2(self._bkey, salt, Decryptor.dklen, Decryptor.count,
Decryptor.prf, hmac_hash_module=None)
logging.debug('KEY check expected = %s',
binascii.hexlify(self._checkMsg[:32]))
logging.debug('RESULT = %s', binascii.hexlify(res))
if res == self._checkMsg[:32]:
logging.info('OK, backup key is correct!')
self._good = True
else:
logging.error('KO, backup key is wrong!')
self._good = False
def decrypt_package(self, dec_material, data):
if not self._good:
logging.warning('well, it is hard to decrypt with a wrong key.')
if not dec_material.encMsgV3:
logging.error('cannot decrypt with an empty encMsgV3!')
return None
salt = dec_material.encMsgV3[:32]
counter_iv = dec_material.encMsgV3[32:]
key = PBKDF2(self._bkey, salt, Decryptor.dklen, Decryptor.count,
Decryptor.prf, hmac_hash_module=None)
counter_obj = Counter.new(128, initial_value=int.from_bytes(
counter_iv, byteorder='big'), little_endian=False)
decryptor = AES.new(key, mode=AES.MODE_CTR, counter=counter_obj)
return decryptor.decrypt(data)
def decrypt_file(self, dec_material, data):
if not self._good:
logging.warning('well, it is hard to decrypt with a wrong key.')
if not dec_material.iv:
logging.error('cannot decrypt with an empty iv!')
return None
counter_obj = Counter.new(
128,
initial_value=int.from_bytes(dec_material.iv, byteorder='big'),
little_endian=False)
decryptor = AES.new(
self._bkey_sha256, mode=AES.MODE_CTR, counter=counter_obj)
return decryptor.decrypt(data)
# --- info.xml ----------------------------------------------------------------
def xml_get_column_value(xml_node):
child = xml_node.firstChild
if child.tagName != 'value':
logging.warning('xml_get_column_value: entry has no values!')
return None
if child.hasAttribute('Null'):
return None
if child.hasAttribute('String'):
return str(child.getAttribute('String'))
if child.hasAttribute('Integer'):
return int(child.getAttribute('Integer'))
logging.warning('xml_get_column_value: unknown value attribute.')
return None
def parse_backup_files_type_info(decryptor, xml_entry):
for entry in xml_entry.getElementsByTagName('column'):
name = entry.getAttribute('name')
if name == 'e_perbackupkey':
decryptor.e_perbackupkey = xml_get_column_value(entry)
elif name == 'pwkey_salt':
decryptor.pwkey_salt = xml_get_column_value(entry)
elif name == 'type_attch':
decryptor.type_attch = xml_get_column_value(entry)
elif name == 'checkMsg':
decryptor.checkMsg = xml_get_column_value(entry)
return decryptor
def ignore_entry(xml_entry):
logging.debug('ignoring entry %s', xml_entry.getAttribute('table'))
def parse_backup_file_module_info(xml_entry):
decm = DecryptMaterial(xml_entry.getAttribute('table'))
for entry in xml_entry.getElementsByTagName('column'):
tag_name = entry.getAttribute('name')
if tag_name == 'encMsgV3':
decm.encMsgV3 = xml_get_column_value(entry)
elif tag_name == 'checkMsgV3':
#TBR: reverse this double sized checkMsgV3.
pass
elif tag_name == 'name':
decm.name = xml_get_column_value(entry)
if decm.do_check() is False:
decm = None
return decm
info_xml_callbacks = {
'HeaderInfo' : ignore_entry,
'BackupFilePhoneInfo' : ignore_entry,
'BackupFileVersionInfo' : ignore_entry,
'BackupFileModuleInfo' : parse_backup_file_module_info,
'BackupFileModuleInfo_Contact' : parse_backup_file_module_info,
'BackupFileModuleInfo_Media' : parse_backup_file_module_info,
'BackupFileModuleInfo_SystemData' : parse_backup_file_module_info
}
def parse_info_xml(filepath, decryptor, decrypt_material_dict):
info_dom = None
with filepath.open('r', encoding='utf-8') as info_xml:
info_dom = xml.dom.minidom.parse(info_xml)
if info_dom.firstChild.tagName != 'info.xml':
logging.error('First tag should be \'info.xml\', not %s',
info_dom.firstChild.tagName)
return None, None
parent = filepath.parent
for entry in info_dom.getElementsByTagName('row'):
title = entry.getAttribute('table')
if title == 'BackupFilesTypeInfo':
decryptor = parse_backup_files_type_info(decryptor, entry)
else:
if title in info_xml_callbacks:
dec_material = info_xml_callbacks[title](entry)
if dec_material:
dkey = parent.joinpath(dec_material.name)
decrypt_material_dict[dkey] = dec_material
else:
logging.warning('Unknown entry in info.xml: %s', title)
return decryptor, decrypt_material_dict
def parse_xml(filepath, decrypt_material_dict):
xml_dom = None
with filepath.open('r', encoding='utf-8') as xml_file:
xml_dom = xml.dom.minidom.parse(xml_file)
logging.debug('parsing xml file %s', filepath.name)
parent = filepath.parent.joinpath(filepath.stem)
for entry in xml_dom.getElementsByTagName('File'):
path = entry.getElementsByTagName('Path')[0].firstChild.data
iv = entry.getElementsByTagName('Iv')[0].firstChild.data
if path and iv:
dec_material = DecryptMaterial(filepath.stem)
# XML files use Windows style path separator, backslash.
if os.name != 'nt':
path = path.replace('\\', '/')
dec_material.path = path
dec_material.iv = iv
dkey = parent.joinpath(path.lstrip('/').lstrip('\\'))
decrypt_material_dict[dkey] = dec_material
return decrypt_material_dict
# --- tar_extract_win ---------------------------------------------------------
def tar_extract_win(tar_obj, dest_dir):
win_illegal = ':<>|"?*\n'
table = str.maketrans(win_illegal, '_' * len(win_illegal))
for member in tar_obj.getmembers():
if member.isdir():
new_dir = dest_dir.joinpath(member.path.translate(table))
new_dir.mkdir(exist_ok=True)
else:
dest_file = dest_dir.joinpath(member.path.translate(table))
try:
with open(dest_file, "wb") as fout:
fout.write(tarfile.ExFileObject(tar_obj, member).read())
except FileNotFoundError:
logging.error('unable to extract %s', dest_file)
# --- main --------------------------------------------------------------------
def main(password, backup_path_in, dest_path_out):
xml_files = []
apk_files = []
tar_files = []
enc_files = []
db_files = []
unk_files = []
folders = []
logging.info('getting files and folder from %s', backup_path_in)
backup_all_files = backup_path_in.glob('**/*')
for entry in backup_all_files:
if entry.is_dir():
folders.append(entry.absolute())
continue
extension = entry.suffix.lower()
if extension == '.xml':
xml_files.append(entry.absolute())
elif extension == '.apk':
apk_files.append(entry.absolute())
elif extension == '.tar':
tar_files.append(entry.absolute())
elif extension == '.db':
db_files.append(entry.absolute())
elif extension == '.enc':
enc_files.append(entry.absolute())
else:
unk_files.append(entry.absolute())
decrypt_material_dict = {}
decryptor = Decryptor(password)
logging.info('parsing XML files...')
for entry in xml_files:
logging.info('parsing xml %s', entry.name)
if entry.name.lower() == 'info.xml':
decryptor, decrypt_material_dict = parse_info_xml(
entry, decryptor, decrypt_material_dict)
else:
decrypt_material_dict = parse_xml(
entry, decrypt_material_dict)
decryptor.crypto_init()
if decryptor.good is False:
logging.critical('decryption key is not good...')
return
logging.info('copying apk to destination...')
data_apk_dir = dest_path_out.absolute().joinpath('data/app')
data_apk_dir.mkdir(parents=True)
done_list = []
for entry in apk_files:
logging.info('working on %s', entry.name)
dest_file = data_apk_dir.joinpath(entry.name + '-1')
dest_file.mkdir(exist_ok=True)
dest_file = dest_file.joinpath('base.apk')
dest_file.write_bytes(entry.read_bytes())
done_list.append(entry)
for entry in done_list:
apk_files.remove(entry)
logging.info('decrypting and un-tar-ing packages to destination...')
data_app_dir = dest_path_out.absolute().joinpath('data/data')
data_app_dir.mkdir(parents=True)
done_list = []
for entry in tar_files:
logging.info('working on %s', entry.name)
cleartext = None
skey = entry.absolute().with_suffix('')
if skey in decrypt_material_dict:
done_list.append(entry)
cleartext = decryptor.decrypt_package(
decrypt_material_dict[skey], entry.read_bytes())
else:
logging.warning('entry %s has no decrypt material!', skey)
if cleartext:
with tarfile.open(fileobj=io.BytesIO(cleartext)) as tar_data:
if os.name == 'nt':
tar_extract_win(tar_data, data_app_dir)
else:
tar_data.extractall(path=data_app_dir)
for entry in done_list:
tar_files.remove(entry)
logging.info('decrypting database files to destination...')
data_app_dir = dest_path_out.absolute().joinpath('db')
data_app_dir.mkdir(parents=True)
done_list = []
for entry in db_files:
logging.info('working on %s', entry.name)
cleartext = None
skey = entry.absolute().with_suffix('')
if skey in decrypt_material_dict:
done_list.append(entry)
cleartext = decryptor.decrypt_package(
decrypt_material_dict[skey], entry.read_bytes())
else:
logging.warning('entry %s has no decrypt material!', skey)
if cleartext:
dest_file = data_app_dir.joinpath(entry.name)
dest_file.write_bytes(cleartext)
for entry in done_list:
db_files.remove(entry)
logging.info('decrypting multimedia files to destination...')
done_list = []
for entry in enc_files:
cleartext = None
dec_material = None
skey = entry.absolute().with_suffix('')
if skey in decrypt_material_dict:
done_list.append(entry)
dec_material = decrypt_material_dict[skey]
cleartext = decryptor.decrypt_file(
dec_material, entry.read_bytes())
else:
logging.warning('entry %s has no decrypt material!', skey)
if cleartext and dec_material:
dest_file = dest_path_out.absolute()
tmp_path = dec_material.path.lstrip('/').lstrip('\\')
dest_file = dest_file.joinpath(tmp_path)
dest_dir = dest_file.parent
dest_dir.mkdir(parents=True, exist_ok=True)
dest_file.write_bytes(cleartext)
for entry in done_list:
enc_files.remove(entry)
logging.info('copying unmanaged files to destination...')
data_unk_dir = dest_path_out.absolute().joinpath('misc')
data_unk_dir.mkdir(parents=True)
done_list = []
for entry in unk_files:
common_path = os.path.commonpath([
entry.absolute(), backup_path_in.absolute()])
relative_path = str(entry.absolute()).replace(common_path, '')
relative_path = relative_path.lstrip('/').lstrip('\\')
dest_file = data_unk_dir.joinpath(relative_path)
dest_file.parent.mkdir(parents=True, exist_ok=True)
dest_file.write_bytes(entry.read_bytes())
done_list.append(entry)
for entry in done_list:
unk_files.remove(entry)
all_dest_files = dest_path_out.glob('**/*')
for entry in all_dest_files:
os.chmod(entry, 0o444)
for entry in apk_files:
logging.warning('APK file not handled: %s', entry.name)
for entry in tar_files:
logging.warning('TAR file not handled: %s', entry.name)
for entry in db_files:
logging.warning('DB file not handled: %s', entry.name)
for entry in enc_files:
logging.warning('ENC file not handled: %s', entry.name)
for entry in unk_files:
logging.warning('UNK file not handled: %s', entry.name)
# --- entry point and parameters checks ---------------------------------------
if __name__ == '__main__':
if sys.version_info[0] < 3:
sys.exit('Python 3 or a more recent version is required.')
description = 'Huawei KoBackup decryptor version {}'.format(VERSION)
parser = argparse.ArgumentParser(description=description)
parser.add_argument('password', help='user password for the backup')
parser.add_argument('backup_path', help='backup folder')
parser.add_argument('dest_path', help='decrypted backup folder')
parser.add_argument('-v', '--verbose', action='count',
help='verbose level, -v to -vvv')
args = parser.parse_args()
log_level = logging.CRITICAL
if not args.verbose:
log_level = logging.ERROR
elif args.verbose == 1:
log_level = logging.WARNING
elif args.verbose == 2:
log_level = logging.INFO
elif args.verbose >= 3:
log_level = logging.DEBUG
logging.basicConfig(level=log_level)
user_password = args.password.encode('utf-8')
backup_path = pathlib.Path(args.backup_path)
if not backup_path.is_dir():
sys.exit('Backup folder does not exist!')
dest_path = pathlib.Path(args.dest_path)
if dest_path.is_dir():
sys.exit('Destination folder already exists!')
dest_path.mkdir(parents=True)
main(user_password, backup_path, dest_path)