mirror of
https://github.com/hashcat/hashcat.git
synced 2025-07-05 06:12:35 +00:00
Fixed handling of password candidates that are shorter than the minimum password length in Association Attack
This commit is contained in:
parent
045ca5cb7a
commit
6d2d865830
@ -20,10 +20,11 @@
|
|||||||
##
|
##
|
||||||
|
|
||||||
- Fixed functional error when nonce-error-corrections that were set on the command line in hash-mode 22000/22001 were not accepted
|
- Fixed functional error when nonce-error-corrections that were set on the command line in hash-mode 22000/22001 were not accepted
|
||||||
- Fixed method how OPTS_TYPE_AUX* kernels are called in association mode, for instance WPA/WPA2 kernels
|
- Fixed handling of password candidates that are shorter than the minimum password length in Association Attack
|
||||||
|
- Fixed method of how OPTS_TYPE_AUX* kernels are called in an association attack, for example in WPA/WPA2 kernel
|
||||||
- Fixed missing option flag OPTS_TYPE_SUGGEST_KG for hash-mode 11600 to inform the user about possible false positives in this mode
|
- Fixed missing option flag OPTS_TYPE_SUGGEST_KG for hash-mode 11600 to inform the user about possible false positives in this mode
|
||||||
- Fixed undefined function call to hc_byte_perm_S() in hash-mode 17010 on non-CUDA compute devices
|
- Fixed undefined function call to hc_byte_perm_S() in hash-mode 17010 on non-CUDA compute devices
|
||||||
- Fixed HEX wordlist handling in -m 3000
|
- Fixed wordlist handling in -m 3000 when candidate passwords use the $HEX[...] syntax
|
||||||
|
|
||||||
##
|
##
|
||||||
## Technical
|
## Technical
|
||||||
|
@ -1437,6 +1437,7 @@ static int calc (hashcat_ctx_t *hashcat_ctx, hc_device_param_t *device_param)
|
|||||||
// we can't reject password base on length in -a 9 because it will bring the schedule out of sync
|
// we can't reject password base on length in -a 9 because it will bring the schedule out of sync
|
||||||
// therefore we render it defective so the other candidates survive
|
// therefore we render it defective so the other candidates survive
|
||||||
|
|
||||||
|
line_len = MAX (line_len, hashconfig->pw_min);
|
||||||
line_len = MIN (line_len, hashconfig->pw_max);
|
line_len = MIN (line_len, hashconfig->pw_max);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user