1
0
mirror of https://github.com/hashcat/hashcat.git synced 2025-07-10 00:28:11 +00:00

UTF8-to-UTF16: Replaced naive UTF8 to UTF16 conversion with true conversion for RAR3, AES Crypt, MultiBit HD (scrypt) and Umbraco HMAC-SHA1

This commit is contained in:
Jens Steube 2021-05-22 11:14:51 +02:00
parent 0457016834
commit 19d3696bd5
4 changed files with 83 additions and 85 deletions

View File

@ -43,26 +43,21 @@ KERNEL_FQ void m24800_mxx (KERN_ATTR_RULES ())
tmp.pw_len = apply_rules (rules_buf[il_pos].cmds, tmp.i, tmp.pw_len); tmp.pw_len = apply_rules (rules_buf[il_pos].cmds, tmp.i, tmp.pw_len);
// swap endian
for (u32 i = 0, idx = 0; i < tmp.pw_len; i += 4, idx += 1)
{
tmp.i[idx] = hc_swap32 (tmp.i[idx]);
}
u32 t[128] = { 0 }; u32 t[128] = { 0 };
// make it unicode. hc_enc_t hc_enc;
for (u32 i = 0, idx = 0; i < tmp.pw_len; i += 16, idx += 4)
{ hc_enc_init (&hc_enc);
make_utf16beN (&tmp.i[idx], &t[(idx * 2) + 0], &t[(idx * 2) + 4]);
} const u32 t_len = hc_enc_next (&hc_enc, tmp.i, tmp.pw_len, 256, t, sizeof (t));
// hash time // hash time
sha1_hmac_ctx_t ctx; sha1_hmac_ctx_t ctx;
sha1_hmac_init (&ctx, t, tmp.pw_len * 2); sha1_hmac_init_swap (&ctx, t, t_len);
sha1_hmac_update (&ctx, t, tmp.pw_len * 2); sha1_hmac_update_swap (&ctx, t, t_len);
sha1_hmac_final (&ctx); sha1_hmac_final (&ctx);
@ -114,26 +109,21 @@ KERNEL_FQ void m24800_sxx (KERN_ATTR_RULES ())
tmp.pw_len = apply_rules (rules_buf[il_pos].cmds, tmp.i, tmp.pw_len); tmp.pw_len = apply_rules (rules_buf[il_pos].cmds, tmp.i, tmp.pw_len);
// swap endian
for (u32 i = 0, idx = 0; i < tmp.pw_len; i += 4, idx += 1)
{
tmp.i[idx] = hc_swap32 (tmp.i[idx]);
}
u32 t[128] = { 0 }; u32 t[128] = { 0 };
// make it unicode. hc_enc_t hc_enc;
for (u32 i = 0, idx = 0; i < tmp.pw_len; i += 16, idx += 4)
{ hc_enc_init (&hc_enc);
make_utf16beN (&tmp.i[idx], &t[(idx * 2) + 0], &t[(idx * 2) + 4]);
} const u32 t_len = hc_enc_next (&hc_enc, tmp.i, tmp.pw_len, 256, t, sizeof (t));
// hash time // hash time
sha1_hmac_ctx_t ctx; sha1_hmac_ctx_t ctx;
sha1_hmac_init (&ctx, t, tmp.pw_len * 2); sha1_hmac_init_swap (&ctx, t, t_len);
sha1_hmac_update (&ctx, t, tmp.pw_len * 2); sha1_hmac_update_swap (&ctx, t, t_len);
sha1_hmac_final (&ctx); sha1_hmac_final (&ctx);

View File

@ -35,7 +35,7 @@ KERNEL_FQ void m24800_mxx (KERN_ATTR_BASIC ())
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1) for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{ {
w[idx] = hc_swap32_S (pws[gid].i[idx]); w[idx] = pws[gid].i[idx];
} }
/** /**
@ -53,10 +53,10 @@ KERNEL_FQ void m24800_mxx (KERN_ATTR_BASIC ())
#endif #endif
for (int idx = 0; idx < 64; idx++) for (int idx = 0; idx < 64; idx++)
{ {
c[idx] = hc_swap32_S (combs_buf[il_pos].i[idx]); c[idx] = combs_buf[il_pos].i[idx];
} }
switch_buffer_by_offset_1x64_be_S (c, pw_len); switch_buffer_by_offset_1x64_le_S (c, pw_len);
#ifdef _unroll #ifdef _unroll
#pragma unroll #pragma unroll
@ -68,17 +68,19 @@ KERNEL_FQ void m24800_mxx (KERN_ATTR_BASIC ())
u32 t[128] = { 0 }; u32 t[128] = { 0 };
// make it unicode. hc_enc_t hc_enc;
for (u32 i = 0, idx = 0; i < pw_len + comb_len; i += 16, idx += 4)
{ hc_enc_init (&hc_enc);
make_utf16beN (&c[idx], &t[(idx * 2) + 0], &t[(idx * 2) + 4]);
} const u32 t_len = hc_enc_next (&hc_enc, c, pw_len + comb_len, 256, t, sizeof (t));
// hash time
sha1_hmac_ctx_t ctx; sha1_hmac_ctx_t ctx;
sha1_hmac_init (&ctx, t, (pw_len + comb_len) * 2); sha1_hmac_init_swap (&ctx, t, t_len);
sha1_hmac_update (&ctx, t, (pw_len + comb_len) * 2); sha1_hmac_update_swap (&ctx, t, t_len);
sha1_hmac_final (&ctx); sha1_hmac_final (&ctx);
@ -124,7 +126,7 @@ KERNEL_FQ void m24800_sxx (KERN_ATTR_BASIC ())
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1) for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{ {
w[idx] = hc_swap32_S (pws[gid].i[idx]); w[idx] = pws[gid].i[idx];
} }
/** /**
@ -142,10 +144,10 @@ KERNEL_FQ void m24800_sxx (KERN_ATTR_BASIC ())
#endif #endif
for (int idx = 0; idx < 64; idx++) for (int idx = 0; idx < 64; idx++)
{ {
c[idx] = hc_swap32_S (combs_buf[il_pos].i[idx]); c[idx] = combs_buf[il_pos].i[idx];
} }
switch_buffer_by_offset_1x64_be_S (c, pw_len); switch_buffer_by_offset_1x64_le_S (c, pw_len);
#ifdef _unroll #ifdef _unroll
#pragma unroll #pragma unroll
@ -157,17 +159,19 @@ KERNEL_FQ void m24800_sxx (KERN_ATTR_BASIC ())
u32 t[128] = { 0 }; u32 t[128] = { 0 };
// make it unicode. hc_enc_t hc_enc;
for (u32 i = 0, idx = 0; i < pw_len + comb_len; i += 16, idx += 4)
{ hc_enc_init (&hc_enc);
make_utf16beN (&c[idx], &t[(idx * 2) + 0], &t[(idx * 2) + 4]);
} const u32 t_len = hc_enc_next (&hc_enc, c, pw_len + comb_len, 256, t, sizeof (t));
// hash time
sha1_hmac_ctx_t ctx; sha1_hmac_ctx_t ctx;
sha1_hmac_init (&ctx, t, (pw_len + comb_len) * 2); sha1_hmac_init_swap (&ctx, t, t_len);
sha1_hmac_update (&ctx, t, (pw_len + comb_len) * 2); sha1_hmac_update_swap (&ctx, t, t_len);
sha1_hmac_final (&ctx); sha1_hmac_final (&ctx);

View File

@ -3,14 +3,14 @@
* License.....: MIT * License.....: MIT
*/ */
#define NEW_SIMD_CODE //#define NEW_SIMD_CODE
#ifdef KERNEL_STATIC #ifdef KERNEL_STATIC
#include "inc_vendor.h" #include "inc_vendor.h"
#include "inc_types.h" #include "inc_types.h"
#include "inc_platform.cl" #include "inc_platform.cl"
#include "inc_common.cl" #include "inc_common.cl"
#include "inc_simd.cl" #include "inc_scalar.cl"
#include "inc_hash_sha1.cl" #include "inc_hash_sha1.cl"
#endif #endif
@ -31,11 +31,11 @@ KERNEL_FQ void m24800_mxx (KERN_ATTR_VECTOR ())
const u32 pw_len = pws[gid].pw_len; const u32 pw_len = pws[gid].pw_len;
u32x w[64] = { 0 }; u32 w[64] = { 0 };
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1) for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{ {
w[idx] = pws[gid].i[idx]; w[idx] = hc_swap32_S (pws[gid].i[idx]);
} }
/** /**
@ -48,32 +48,34 @@ KERNEL_FQ void m24800_mxx (KERN_ATTR_VECTOR ())
{ {
const u32x w0r = words_buf_r[il_pos / VECT_SIZE]; const u32x w0r = words_buf_r[il_pos / VECT_SIZE];
const u32x w0 = w0l | w0r; const u32x w0 = w0l | hc_swap32_S (w0r);
w[0] = w0; w[0] = w0;
u32x t[128] = { 0 }; u32 t[128] = { 0 };
// make it unicode. hc_enc_t hc_enc;
for (u32 i = 0, idx = 0; i < pw_len; i += 16, idx += 4)
{
make_utf16beN (&w[idx], &t[(idx * 2) + 0], &t[(idx * 2) + 4]);
}
sha1_hmac_ctx_vector_t ctx; hc_enc_init (&hc_enc);
sha1_hmac_init_vector (&ctx, t, pw_len * 2); const u32 t_len = hc_enc_next (&hc_enc, w, pw_len, 256, t, sizeof (t));
sha1_hmac_update_vector (&ctx, t, pw_len * 2); // hash time
sha1_hmac_final_vector (&ctx); sha1_hmac_ctx_t ctx;
const u32x r0 = ctx.opad.h[DGST_R0]; sha1_hmac_init_swap (&ctx, t, t_len);
const u32x r1 = ctx.opad.h[DGST_R1];
const u32x r2 = ctx.opad.h[DGST_R2];
const u32x r3 = ctx.opad.h[DGST_R3];
COMPARE_M_SIMD (r0, r1, r2, r3); sha1_hmac_update_swap (&ctx, t, t_len);
sha1_hmac_final (&ctx);
const u32 r0 = ctx.opad.h[DGST_R0];
const u32 r1 = ctx.opad.h[DGST_R1];
const u32 r2 = ctx.opad.h[DGST_R2];
const u32 r3 = ctx.opad.h[DGST_R3];
COMPARE_M_SCALAR (r0, r1, r2, r3);
} }
} }
@ -106,11 +108,11 @@ KERNEL_FQ void m24800_sxx (KERN_ATTR_VECTOR ())
const u32 pw_len = pws[gid].pw_len; const u32 pw_len = pws[gid].pw_len;
u32x w[64] = { 0 }; u32 w[64] = { 0 };
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1) for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{ {
w[idx] = pws[gid].i[idx]; w[idx] = hc_swap32_S (pws[gid].i[idx]);
} }
/** /**
@ -123,31 +125,33 @@ KERNEL_FQ void m24800_sxx (KERN_ATTR_VECTOR ())
{ {
const u32x w0r = words_buf_r[il_pos / VECT_SIZE]; const u32x w0r = words_buf_r[il_pos / VECT_SIZE];
const u32x w0 = w0l | w0r; const u32x w0 = w0l | hc_swap32_S (w0r);
w[0] = w0; w[0] = w0;
u32x t[128] = { 0 }; u32 t[128] = { 0 };
// make it unicode. hc_enc_t hc_enc;
for (u32 i = 0, idx = 0; i < pw_len; i += 16, idx += 4)
{
make_utf16beN (&w[idx], &t[(idx * 2) + 0], &t[(idx * 2) + 4]);
}
sha1_hmac_ctx_vector_t ctx; hc_enc_init (&hc_enc);
sha1_hmac_init_vector (&ctx, t, pw_len * 2); const u32 t_len = hc_enc_next (&hc_enc, w, pw_len, 256, t, sizeof (t));
sha1_hmac_update_vector (&ctx, t, pw_len * 2); // hash time
sha1_hmac_final_vector (&ctx); sha1_hmac_ctx_t ctx;
const u32x r0 = ctx.opad.h[DGST_R0]; sha1_hmac_init_swap (&ctx, t, t_len);
const u32x r1 = ctx.opad.h[DGST_R1];
const u32x r2 = ctx.opad.h[DGST_R2];
const u32x r3 = ctx.opad.h[DGST_R3];
COMPARE_S_SIMD (r0, r1, r2, r3); sha1_hmac_update_swap (&ctx, t, t_len);
sha1_hmac_final (&ctx);
const u32 r0 = ctx.opad.h[DGST_R0];
const u32 r1 = ctx.opad.h[DGST_R1];
const u32 r2 = ctx.opad.h[DGST_R2];
const u32 r3 = ctx.opad.h[DGST_R3];
COMPARE_S_SCALAR (r0, r1, r2, r3);
} }
} }

View File

@ -16,7 +16,7 @@
- CUDA Backend: Do not warn about missing CUDA SDK installation if --stdout is used - CUDA Backend: Do not warn about missing CUDA SDK installation if --stdout is used
- Performance Monitor: Add -S as a user suggestion to improve cracking performance in specific attack configurations - Performance Monitor: Add -S as a user suggestion to improve cracking performance in specific attack configurations
- Status Screen: Show currently running kernel type (pure, optimized) and generator type (host, device) - Status Screen: Show currently running kernel type (pure, optimized) and generator type (host, device)
- UTF8-to-UTF16: Replaced naive UTF8 to UTF16 conversion with true conversion for RAR3, AES Crypt and MultiBit HD (scrypt) - UTF8-to-UTF16: Replaced naive UTF8 to UTF16 conversion with true conversion for RAR3, AES Crypt, MultiBit HD (scrypt) and Umbraco HMAC-SHA1
- AES Crypt Plugin: Reduced max password length from 256 to 128 which improved performance by 22% - AES Crypt Plugin: Reduced max password length from 256 to 128 which improved performance by 22%
## ##