mirror of
https://github.com/hashcat/hashcat.git
synced 2025-02-12 23:52:42 +00:00
Fixed DEScrypt cracking in BF mode in case the hashlist contains more than 16 times the same salt
Fixes https://github.com/hashcat/hashcat/issues/972
This commit is contained in:
parent
f88644f8c1
commit
5c5f8da9b1
@ -2203,8 +2203,8 @@ static void m01500m (__global pw_t *pws, __global const kernel_rule_t *rules_buf
|
|||||||
#endif
|
#endif
|
||||||
for (int i = 0; i < 32; i++)
|
for (int i = 0; i < 32; i++)
|
||||||
{
|
{
|
||||||
out0[i] = out[ 0 + i];
|
out0[i] = out[ 0 + 31 - i];
|
||||||
out1[i] = out[32 + i];
|
out1[i] = out[32 + 31 - i];
|
||||||
}
|
}
|
||||||
|
|
||||||
transpose32c (out0);
|
transpose32c (out0);
|
||||||
@ -2215,8 +2215,8 @@ static void m01500m (__global pw_t *pws, __global const kernel_rule_t *rules_buf
|
|||||||
#endif
|
#endif
|
||||||
for (int slice = 0; slice < 32; slice++)
|
for (int slice = 0; slice < 32; slice++)
|
||||||
{
|
{
|
||||||
const u32 r0 = out0[slice];
|
const u32 r0 = out0[31 - slice];
|
||||||
const u32 r1 = out1[slice];
|
const u32 r1 = out1[31 - slice];
|
||||||
const u32 r2 = 0;
|
const u32 r2 = 0;
|
||||||
const u32 r3 = 0;
|
const u32 r3 = 0;
|
||||||
|
|
||||||
|
@ -22,7 +22,8 @@
|
|||||||
## Bugs
|
## Bugs
|
||||||
##
|
##
|
||||||
|
|
||||||
- Fixed a problem with maximal password length with the combinator attack
|
- Fixed truncation of password after position 32 with the combinator attack
|
||||||
|
- Fixed DEScrypt cracking in BF mode in case the hashlist contains more than 16 times the same salt
|
||||||
|
|
||||||
* changes v3.20 -> v3.30:
|
* changes v3.20 -> v3.30:
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user