1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-15 20:39:17 +00:00
hashcat/src/modules/module_29541.c

472 lines
268 KiB
C
Raw Normal View History

2022-06-15 11:01:22 +00:00
/**
* Author......: See docs/credits.txt
* License.....: MIT
*/
#include "common.h"
#include "types.h"
#include "modules.h"
#include "bitops.h"
#include "convert.h"
#include "shared.h"
#include "memory.h"
static const u32 ATTACK_EXEC = ATTACK_EXEC_OUTSIDE_KERNEL;
static const u32 DGST_POS0 = 0;
static const u32 DGST_POS1 = 1;
static const u32 DGST_POS2 = 2;
static const u32 DGST_POS3 = 3;
static const u32 DGST_SIZE = DGST_SIZE_4_16;
static const u32 HASH_CATEGORY = HASH_CATEGORY_FDE;
static const char *HASH_NAME = "LUKS v1 RIPEMD-160 + AES";
static const u64 KERN_TYPE = 14641;
static const u32 OPTI_TYPE = OPTI_TYPE_ZERO_BYTE
| OPTI_TYPE_SLOW_HASH_SIMD_LOOP;
static const u64 OPTS_TYPE = OPTS_TYPE_STOCK_MODULE
| OPTS_TYPE_PT_GENERATE_LE;
static const u32 SALT_TYPE = SALT_TYPE_EMBEDDED;
static const char *ST_PASS = "hashcat";
static const char *ST_HASH = "$luks$1$ripemd160$aes$cbc-essiv:sha256$256$106666$0e4b2d61153a322af5defd708c98b8251b34b09d0f39d3dcee80f8114d7922b3$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
u32 module_attack_exec (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ATTACK_EXEC; }
u32 module_dgst_pos0 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS0; }
u32 module_dgst_pos1 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS1; }
u32 module_dgst_pos2 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS2; }
u32 module_dgst_pos3 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS3; }
u32 module_dgst_size (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_SIZE; }
u32 module_hash_category (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return HASH_CATEGORY; }
const char *module_hash_name (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return HASH_NAME; }
u64 module_kern_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return KERN_TYPE; }
u32 module_opti_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return OPTI_TYPE; }
u64 module_opts_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return OPTS_TYPE; }
u32 module_salt_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return SALT_TYPE; }
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
#define LUKS_STRIPES 4000
#define LUKS_SALT_LEN 32
#define LUKS_CT_LEN 512
#define LUKS_AF_MIN_LEN ((HC_LUKS_KEY_SIZE_128 / 8) * LUKS_STRIPES)
#define LUKS_AF_MAX_LEN ((HC_LUKS_KEY_SIZE_512 / 8) * LUKS_STRIPES)
typedef enum hc_luks_hash_type
{
HC_LUKS_HASH_TYPE_SHA1 = 1,
HC_LUKS_HASH_TYPE_SHA256 = 2,
HC_LUKS_HASH_TYPE_SHA512 = 3,
HC_LUKS_HASH_TYPE_RIPEMD160 = 4,
HC_LUKS_HASH_TYPE_WHIRLPOOL = 5,
} hc_luks_hash_type_t;
typedef enum hc_luks_key_size
{
HC_LUKS_KEY_SIZE_128 = 128,
HC_LUKS_KEY_SIZE_256 = 256,
HC_LUKS_KEY_SIZE_512 = 512,
} hc_luks_key_size_t;
typedef enum hc_luks_cipher_type
{
HC_LUKS_CIPHER_TYPE_AES = 1,
HC_LUKS_CIPHER_TYPE_SERPENT = 2,
HC_LUKS_CIPHER_TYPE_TWOFISH = 3,
} hc_luks_cipher_type_t;
typedef enum hc_luks_cipher_mode
{
HC_LUKS_CIPHER_MODE_CBC_ESSIV_SHA256 = 1,
HC_LUKS_CIPHER_MODE_CBC_PLAIN = 2,
HC_LUKS_CIPHER_MODE_CBC_PLAIN64 = 3,
HC_LUKS_CIPHER_MODE_XTS_PLAIN = 4,
HC_LUKS_CIPHER_MODE_XTS_PLAIN64 = 5,
} hc_luks_cipher_mode_t;
typedef struct luks
{
int hash_type; // hc_luks_hash_type_t
int key_size; // hc_luks_key_size_t
int cipher_type; // hc_luks_cipher_type_t
int cipher_mode; // hc_luks_cipher_mode_t
u32 ct_buf[LUKS_CT_LEN / 4];
u32 af_buf[LUKS_AF_MAX_LEN / 4];
u32 af_len;
} luks_t;
typedef struct luks_tmp
{
u32 ipad32[8];
u64 ipad64[8];
u32 opad32[8];
u64 opad64[8];
u32 dgst32[32];
u64 dgst64[16];
u32 out32[32];
u64 out64[16];
} luks_tmp_t;
static const char *SIGNATURE_LUKS = "$luks$1$ripemd160$aes$";
u64 module_esalt_size (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
{
const u64 esalt_size = (const u64) sizeof (luks_t);
return esalt_size;
}
u64 module_tmp_size (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
{
const u64 tmp_size = (const u64) sizeof (luks_tmp_t);
return tmp_size;
}
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
{
// this overrides the reductions of PW_MAX in case optimized kernel is selected
// IOW, even in optimized kernel mode it support length 256
const u32 pw_max = PW_MAX;
return pw_max;
}
int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED void *digest_buf, MAYBE_UNUSED salt_t *salt, MAYBE_UNUSED void *esalt_buf, MAYBE_UNUSED void *hook_salt_buf, MAYBE_UNUSED hashinfo_t *hash_info, const char *line_buf, MAYBE_UNUSED const int line_len)
{
luks_t *luks = (luks_t *) esalt_buf;
hc_token_t token;
token.token_cnt = 7;
token.signatures_cnt = 1;
token.signatures_buf[0] = SIGNATURE_LUKS;
// signature with hash and cipher type
token.len[0] = 22;
token.attr[0] = TOKEN_ATTR_FIXED_LENGTH
| TOKEN_ATTR_VERIFY_SIGNATURE;
// cipher mode
token.sep[1] = '$';
token.len_min[1] = 9;
token.len_max[1] = 16;
token.attr[1] = TOKEN_ATTR_VERIFY_LENGTH;
// key size
token.sep[2] = '$';
token.len_min[2] = 3;
token.len_max[2] = 3;
token.attr[2] = TOKEN_ATTR_VERIFY_LENGTH
| TOKEN_ATTR_VERIFY_DIGIT;
// iter
token.sep[3] = '$';
token.len_min[3] = 1;
token.len_max[3] = 10;
token.attr[3] = TOKEN_ATTR_VERIFY_LENGTH
| TOKEN_ATTR_VERIFY_DIGIT;
// salt
token.sep[4] = '$';
token.len_min[4] = LUKS_SALT_LEN * 2;
token.len_max[4] = LUKS_SALT_LEN * 2;
token.attr[4] = TOKEN_ATTR_VERIFY_LENGTH
| TOKEN_ATTR_VERIFY_HEX;
// af
token.sep[5] = '$';
token.len_min[5] = LUKS_AF_MIN_LEN * 2;
token.len_max[5] = LUKS_AF_MAX_LEN * 2;
token.attr[5] = TOKEN_ATTR_VERIFY_LENGTH
| TOKEN_ATTR_VERIFY_HEX;
// ct
token.sep[6] = '$';
token.len_min[6] = LUKS_CT_LEN * 2;
token.len_max[6] = LUKS_CT_LEN * 2;
token.attr[6] = TOKEN_ATTR_VERIFY_LENGTH
| TOKEN_ATTR_VERIFY_HEX;
const int rc_tokenizer = input_tokenizer ((const u8 *) line_buf, line_len, &token);
if (rc_tokenizer != PARSER_OK) return (rc_tokenizer);
// hash type
luks->hash_type = HC_LUKS_HASH_TYPE_RIPEMD160;
// cipher type
luks->cipher_type = HC_LUKS_CIPHER_TYPE_AES;
// cipher mode
const u8 *cipher_mode_pos = token.buf[1];
if (strncmp ((const char *) cipher_mode_pos, "cbc-essiv:sha256", 16) == 0)
{
luks->cipher_mode = HC_LUKS_CIPHER_MODE_CBC_ESSIV_SHA256;
}
else if (strncmp ((const char *) cipher_mode_pos, "cbc-plain", 9) == 0)
{
luks->cipher_mode = HC_LUKS_CIPHER_MODE_CBC_PLAIN;
}
else if (strncmp ((const char *) cipher_mode_pos, "cbc-plain64", 11) == 0)
{
luks->cipher_mode = HC_LUKS_CIPHER_MODE_CBC_PLAIN64;
}
else if (strncmp ((const char *) cipher_mode_pos, "xts-plain", 9) == 0)
{
luks->cipher_mode = HC_LUKS_CIPHER_MODE_XTS_PLAIN;
}
else if (strncmp ((const char *) cipher_mode_pos, "xts-plain64", 11) == 0)
{
luks->cipher_mode = HC_LUKS_CIPHER_MODE_XTS_PLAIN64;
}
else
{
return (PARSER_LUKS_CIPHER_MODE);
}
// key size
const u8 *key_size_pos = token.buf[2];
const u32 key_size = hc_strtoul ((const char *) key_size_pos, NULL, 10);
if (key_size == 128)
{
luks->key_size = HC_LUKS_KEY_SIZE_128;
}
else if (key_size == 256)
{
luks->key_size = HC_LUKS_KEY_SIZE_256;
}
else if (key_size == 512)
{
luks->key_size = HC_LUKS_KEY_SIZE_512;
}
else
{
return (PARSER_LUKS_KEY_SIZE);
}
// salt
const u8 *salt_pos = token.buf[4];
for (u32 i = 0, j = 0; i < LUKS_SALT_LEN / 4; i += 1, j += 8)
{
salt->salt_buf[i] = hex_to_u32 (salt_pos + j);
}
salt->salt_len = LUKS_SALT_LEN;
// iter
const u8 *iter_pos = token.buf[3];
const u32 iter = hc_strtoul ((const char *) iter_pos, NULL, 10);
salt->salt_iter = iter - 1;
// af
u32 af_len = token.len[5] / 2;
if (af_len != (key_size / 8) * LUKS_STRIPES) return (PARSER_LUKS_FILE_SIZE);
const u8 *af_pos = token.buf[5];
for (u32 i = 0, j = 0; i < af_len / 4; i += 1, j += 8)
{
luks->af_buf[i] = hex_to_u32 (af_pos + j);
}
luks->af_len = af_len;
// ct
u32 ct_len = token.len[6] / 2;
if (ct_len != LUKS_CT_LEN) return (PARSER_LUKS_FILE_SIZE);
const u8 *ct_pos = token.buf[6];
for (u32 i = 0, j = 0; i < ct_len / 4; i += 1, j += 8)
{
luks->ct_buf[i] = hex_to_u32 (ct_pos + j);
}
return (PARSER_OK);
}
int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const void *digest_buf, MAYBE_UNUSED const salt_t *salt, MAYBE_UNUSED const void *esalt_buf, MAYBE_UNUSED const void *hook_salt_buf, MAYBE_UNUSED const hashinfo_t *hash_info, char *line_buf, MAYBE_UNUSED const int line_size)
{
luks_t *luks = (luks_t *) esalt_buf;
// cipher mode
char *cipher_mode = "";
2022-06-15 11:01:22 +00:00
switch (luks->cipher_mode)
{
case HC_LUKS_CIPHER_MODE_CBC_ESSIV_SHA256: cipher_mode = "cbc-essiv:sha256"; break;
case HC_LUKS_CIPHER_MODE_CBC_PLAIN: cipher_mode = "cbc-plain"; break;
case HC_LUKS_CIPHER_MODE_CBC_PLAIN64: cipher_mode = "cbc-plain64"; break;
case HC_LUKS_CIPHER_MODE_XTS_PLAIN: cipher_mode = "xts-plain"; break;
case HC_LUKS_CIPHER_MODE_XTS_PLAIN64: cipher_mode = "xts-plain64"; break;
}
// key size
u32 key_size = 0;
2022-06-15 11:01:22 +00:00
switch (luks->key_size)
{
case HC_LUKS_KEY_SIZE_128: key_size = 128; break;
case HC_LUKS_KEY_SIZE_256: key_size = 256; break;
case HC_LUKS_KEY_SIZE_512: key_size = 512; break;
}
// iterations
u32 iterations = salt->salt_iter + 1;
// salt
#define LUKS_SALT_HEX_LEN (LUKS_SALT_LEN * 2 + 1)
char salt_buf[LUKS_SALT_HEX_LEN] = { 0 };
for (u32 i = 0, j = 0; i < LUKS_SALT_LEN / 4; i += 1, j += 8)
{
snprintf (salt_buf + j, LUKS_SALT_HEX_LEN - j, "%08x", byte_swap_32 (salt->salt_buf[i]));
}
// af
#define LUKS_AF_HEX_LEN (LUKS_AF_MAX_LEN * 2 + 1)
char af_buf[LUKS_AF_HEX_LEN] = { 0 };
for (u32 i = 0, j = 0; i < luks->af_len / 4; i += 1, j += 8)
{
snprintf (af_buf + j, LUKS_AF_HEX_LEN - j, "%08x", byte_swap_32 (luks->af_buf[i]));
}
// ct
#define LUKS_CT_HEX_LEN (LUKS_CT_LEN * 2 + 1)
char ct_buf[LUKS_CT_HEX_LEN] = { 0 };
for (u32 i = 0, j = 0; i < LUKS_CT_LEN / 4; i += 1, j += 8)
{
snprintf (ct_buf + j, LUKS_CT_HEX_LEN - j, "%08x", byte_swap_32 (luks->ct_buf[i]));
}
// output
int line_len = snprintf (line_buf, line_size, "%s%s$%u$%u$%s$%s$%s",
SIGNATURE_LUKS,
cipher_mode,
key_size,
iterations,
salt_buf,
af_buf,
ct_buf);
return line_len;
}
void module_init (module_ctx_t *module_ctx)
{
module_ctx->module_context_size = MODULE_CONTEXT_SIZE_CURRENT;
module_ctx->module_interface_version = MODULE_INTERFACE_VERSION_CURRENT;
module_ctx->module_attack_exec = module_attack_exec;
module_ctx->module_benchmark_esalt = MODULE_DEFAULT;
module_ctx->module_benchmark_hook_salt = MODULE_DEFAULT;
module_ctx->module_benchmark_mask = MODULE_DEFAULT;
module_ctx->module_benchmark_salt = MODULE_DEFAULT;
module_ctx->module_build_plain_postprocess = MODULE_DEFAULT;
module_ctx->module_deep_comp_kernel = MODULE_DEFAULT;
module_ctx->module_deprecated_notice = MODULE_DEFAULT;
module_ctx->module_dgst_pos0 = module_dgst_pos0;
module_ctx->module_dgst_pos1 = module_dgst_pos1;
module_ctx->module_dgst_pos2 = module_dgst_pos2;
module_ctx->module_dgst_pos3 = module_dgst_pos3;
module_ctx->module_dgst_size = module_dgst_size;
module_ctx->module_dictstat_disable = MODULE_DEFAULT;
module_ctx->module_esalt_size = module_esalt_size;
module_ctx->module_extra_buffer_size = MODULE_DEFAULT;
module_ctx->module_extra_tmp_size = MODULE_DEFAULT;
module_ctx->module_extra_tuningdb_block = MODULE_DEFAULT;
module_ctx->module_forced_outfile_format = MODULE_DEFAULT;
module_ctx->module_hash_binary_count = MODULE_DEFAULT;
module_ctx->module_hash_binary_parse = MODULE_DEFAULT;
module_ctx->module_hash_binary_save = MODULE_DEFAULT;
module_ctx->module_hash_decode_postprocess = MODULE_DEFAULT;
module_ctx->module_hash_decode_potfile = MODULE_DEFAULT;
module_ctx->module_hash_decode_zero_hash = MODULE_DEFAULT;
module_ctx->module_hash_decode = module_hash_decode;
module_ctx->module_hash_encode_status = MODULE_DEFAULT;
module_ctx->module_hash_encode_potfile = MODULE_DEFAULT;
module_ctx->module_hash_encode = module_hash_encode;
module_ctx->module_hash_init_selftest = MODULE_DEFAULT;
module_ctx->module_hash_mode = MODULE_DEFAULT;
module_ctx->module_hash_category = module_hash_category;
module_ctx->module_hash_name = module_hash_name;
module_ctx->module_hashes_count_min = MODULE_DEFAULT;
module_ctx->module_hashes_count_max = MODULE_DEFAULT;
module_ctx->module_hlfmt_disable = MODULE_DEFAULT;
module_ctx->module_hook_extra_param_size = MODULE_DEFAULT;
module_ctx->module_hook_extra_param_init = MODULE_DEFAULT;
module_ctx->module_hook_extra_param_term = MODULE_DEFAULT;
module_ctx->module_hook12 = MODULE_DEFAULT;
module_ctx->module_hook23 = MODULE_DEFAULT;
module_ctx->module_hook_salt_size = MODULE_DEFAULT;
module_ctx->module_hook_size = MODULE_DEFAULT;
module_ctx->module_jit_build_options = MODULE_DEFAULT;
module_ctx->module_jit_cache_disable = MODULE_DEFAULT;
module_ctx->module_kernel_accel_max = MODULE_DEFAULT;
module_ctx->module_kernel_accel_min = MODULE_DEFAULT;
module_ctx->module_kernel_loops_max = MODULE_DEFAULT;
module_ctx->module_kernel_loops_min = MODULE_DEFAULT;
module_ctx->module_kernel_threads_max = MODULE_DEFAULT;
module_ctx->module_kernel_threads_min = MODULE_DEFAULT;
module_ctx->module_kern_type = module_kern_type;
module_ctx->module_kern_type_dynamic = MODULE_DEFAULT;
module_ctx->module_opti_type = module_opti_type;
module_ctx->module_opts_type = module_opts_type;
module_ctx->module_outfile_check_disable = MODULE_DEFAULT;
module_ctx->module_outfile_check_nocomp = MODULE_DEFAULT;
module_ctx->module_potfile_custom_check = MODULE_DEFAULT;
module_ctx->module_potfile_disable = MODULE_DEFAULT;
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
module_ctx->module_pwdump_column = MODULE_DEFAULT;
module_ctx->module_pw_max = module_pw_max;
module_ctx->module_pw_min = MODULE_DEFAULT;
module_ctx->module_salt_max = MODULE_DEFAULT;
module_ctx->module_salt_min = MODULE_DEFAULT;
module_ctx->module_salt_type = module_salt_type;
module_ctx->module_separator = MODULE_DEFAULT;
module_ctx->module_st_hash = module_st_hash;
module_ctx->module_st_pass = module_st_pass;
module_ctx->module_tmp_size = module_tmp_size;
module_ctx->module_unstable_warning = MODULE_DEFAULT;
module_ctx->module_warmup_disable = MODULE_DEFAULT;
}