mirror of
https://github.com/hashcat/hashcat.git
synced 2024-12-24 23:48:39 +00:00
for -m 11600 = 7zip we need to remove special case, since the padding attack is now gone
This commit is contained in:
parent
afd97454f8
commit
aa14b4ec9e
@ -11853,18 +11853,13 @@ int seven_zip_parse_hash (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAYBE_
|
|||||||
|
|
||||||
seven_zip->aes_len = aes_len;
|
seven_zip->aes_len = aes_len;
|
||||||
|
|
||||||
const u32 margin = data_len - unpack_size;
|
|
||||||
|
|
||||||
if (data_type != 0x80)
|
if (data_type != 0x80)
|
||||||
{
|
{
|
||||||
if (data_type > 2)
|
if (data_type > 2)
|
||||||
{
|
|
||||||
if (margin < 4) // we can't be sure about too many false positives
|
|
||||||
{
|
{
|
||||||
return (PARSER_SALT_VALUE);
|
return (PARSER_SALT_VALUE);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
// real salt
|
// real salt
|
||||||
|
|
||||||
@ -14863,20 +14858,6 @@ void seven_zip_hook_func (hc_device_param_t *device_param, hashes_t *hashes, con
|
|||||||
out_full[j + 2] = out[2];
|
out_full[j + 2] = out[2];
|
||||||
out_full[j + 3] = out[3];
|
out_full[j + 3] = out[3];
|
||||||
|
|
||||||
if (data_type > 2)
|
|
||||||
{
|
|
||||||
// This decompression is currently not supported
|
|
||||||
|
|
||||||
// this check implies also this case:
|
|
||||||
// if (data_type == 0x80) // truncated
|
|
||||||
// we can't do a full CRC check since data in this case is truncated
|
|
||||||
// could lead to a higher number of false positives in very rare cases
|
|
||||||
|
|
||||||
hook_item->hook_success = 1;
|
|
||||||
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* check the CRC32 "hash"
|
* check the CRC32 "hash"
|
||||||
*/
|
*/
|
||||||
|
Loading…
Reference in New Issue
Block a user