mirror of
https://github.com/hashcat/hashcat.git
synced 2024-11-21 23:58:07 +00:00
Fix several constraints of raw modes
This commit is contained in:
parent
eb0e8eed2a
commit
ba803a79ae
@ -48,6 +48,8 @@ u32 module_salt_type (MAYBE_UNUSED const hashconfig_t *hashconfig,
|
||||
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
|
||||
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
|
||||
|
||||
static const char *adm = ":Administration Tools:";
|
||||
|
||||
int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED void *digest_buf, MAYBE_UNUSED salt_t *salt, MAYBE_UNUSED void *esalt_buf, MAYBE_UNUSED void *hook_salt_buf, MAYBE_UNUSED hashinfo_t *hash_info, const char *line_buf, MAYBE_UNUSED const int line_len)
|
||||
{
|
||||
u32 *digest = (u32 *) digest_buf;
|
||||
@ -62,8 +64,8 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
||||
token.attr[0] = TOKEN_ATTR_VERIFY_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_BASE64A;
|
||||
|
||||
token.len_min[1] = 1;
|
||||
token.len_max[1] = SALT_MAX;
|
||||
token.len_min[1] = SALT_MIN;
|
||||
token.len_max[1] = SALT_MAX - 23;
|
||||
token.attr[1] = TOKEN_ATTR_VERIFY_LENGTH;
|
||||
|
||||
const int rc_tokenizer = input_tokenizer ((const u8 *) line_buf, line_len, &token);
|
||||
@ -159,15 +161,15 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
||||
|
||||
if (parse_rc == false) return (PARSER_SALT_LENGTH);
|
||||
|
||||
// max. salt length: 55 (max for MD5) - 22 (":Administration Tools:") - 1 (0x80) = 32
|
||||
// 32 - 4 bytes (to fit w0lr for all attack modes) = 28
|
||||
if (hashconfig->opti_type & OPTI_TYPE_OPTIMIZED_KERNEL)
|
||||
{
|
||||
// max. salt length: 55 (max for MD5) - 22 (":Administration Tools:") - 1 (0x80) = 32
|
||||
|
||||
if (salt->salt_len > 28) return (PARSER_SALT_LENGTH);
|
||||
if (salt->salt_len > 32) return (PARSER_SALT_LENGTH);
|
||||
}
|
||||
|
||||
u8 *salt_buf_ptr = (u8 *) salt->salt_buf;
|
||||
|
||||
static const char *adm = ":Administration Tools:";
|
||||
|
||||
memcpy (salt_buf_ptr + salt->salt_len, adm, strlen (adm));
|
||||
|
||||
salt->salt_len += strlen (adm);
|
||||
@ -179,10 +181,6 @@ int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
||||
{
|
||||
u32 *digest = (u32 *) digest_buf;
|
||||
|
||||
char username[30] = { 0 };
|
||||
|
||||
memcpy (username, salt->salt_buf, salt->salt_len - 22);
|
||||
|
||||
char sig[6] = { 'n', 'r', 'c', 's', 't', 'n' };
|
||||
|
||||
u32 tmp[4];
|
||||
@ -241,7 +239,13 @@ int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
||||
tmp_buf[29] = sig[5];
|
||||
tmp_buf[30] = 0;
|
||||
|
||||
const int line_len = snprintf (line_buf, line_size, "%s:%s", tmp_buf, username);
|
||||
char tmp_salt[SALT_MAX];
|
||||
|
||||
const int salt_len = generic_salt_encode (hashconfig, (const u8 *) salt->salt_buf, (const int) salt->salt_len - strlen (adm), (u8 *) tmp_salt);
|
||||
|
||||
tmp_salt[salt_len] = 0;
|
||||
|
||||
const int line_len = snprintf (line_buf, line_size, "%s:%s", tmp_buf, tmp_salt);
|
||||
|
||||
return line_len;
|
||||
}
|
||||
|
@ -48,6 +48,8 @@ u32 module_salt_type (MAYBE_UNUSED const hashconfig_t *hashconfig,
|
||||
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
|
||||
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
|
||||
|
||||
static const char *skyper = "\nskyper\n";
|
||||
|
||||
int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED void *digest_buf, MAYBE_UNUSED salt_t *salt, MAYBE_UNUSED void *esalt_buf, MAYBE_UNUSED void *hook_salt_buf, MAYBE_UNUSED hashinfo_t *hash_info, const char *line_buf, MAYBE_UNUSED const int line_len)
|
||||
{
|
||||
u32 *digest = (u32 *) digest_buf;
|
||||
@ -96,11 +98,18 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
||||
* add static "salt" part
|
||||
*/
|
||||
|
||||
if (hashconfig->opti_type & OPTI_TYPE_OPTIMIZED_KERNEL)
|
||||
{
|
||||
// max. salt length: 55 (max for MD5) - 8 ("\nskyper\n") - 1 (0x80) = 46
|
||||
|
||||
if (salt->salt_len > 46) return (PARSER_SALT_LENGTH);
|
||||
}
|
||||
|
||||
u8 *salt_buf_ptr = (u8 *) salt->salt_buf;
|
||||
|
||||
memcpy (salt_buf_ptr + salt_len, "\nskyper\n", 8);
|
||||
memcpy (salt_buf_ptr + salt->salt_len, skyper, strlen (skyper));
|
||||
|
||||
salt->salt_len += 8;
|
||||
salt->salt_len += strlen (skyper);
|
||||
|
||||
return (PARSER_OK);
|
||||
}
|
||||
@ -126,7 +135,7 @@ int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
||||
|
||||
char tmp_salt[SALT_MAX];
|
||||
|
||||
const int salt_len = generic_salt_encode (hashconfig, (const u8 *) salt->salt_buf, (const int) salt->salt_len - 8, (u8 *) tmp_salt);
|
||||
const int salt_len = generic_salt_encode (hashconfig, (const u8 *) salt->salt_buf, (const int) salt->salt_len - strlen (skyper), (u8 *) tmp_salt);
|
||||
|
||||
tmp_salt[salt_len] = 0;
|
||||
|
||||
|
@ -67,8 +67,8 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
||||
token.attr[0] = TOKEN_ATTR_FIXED_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_SIGNATURE;
|
||||
|
||||
token.len_min[1] = 28;
|
||||
token.len_max[1] = 368; // 368 = 20 + 256 where 20 is digest length and 256 is SALT_MAX
|
||||
token.len_min[1] = ((20 + SALT_MIN) * 8) / 6;
|
||||
token.len_max[1] = ((20 + SALT_MAX) * 8) / 6;
|
||||
token.attr[1] = TOKEN_ATTR_VERIFY_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_BASE64A;
|
||||
|
||||
|
@ -75,8 +75,8 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
||||
token.attr[1] = TOKEN_ATTR_VERIFY_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_DIGIT;
|
||||
|
||||
token.len_min[2] = 0;
|
||||
token.len_max[2] = 44;
|
||||
token.len_min[2] = (SALT_MIN * 8) / 6;
|
||||
token.len_max[2] = (SALT_MAX * 8) / 6;
|
||||
token.sep[2] = '*';
|
||||
token.attr[2] = TOKEN_ATTR_VERIFY_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_BASE64A;
|
||||
|
@ -65,8 +65,8 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
||||
token.attr[0] = TOKEN_ATTR_FIXED_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_SIGNATURE;
|
||||
|
||||
token.len_min[1] = 44;
|
||||
token.len_max[1] = 385; // 385 = 32 + 256 where 32 is digest length and 256 is SALT_MAX
|
||||
token.len_min[1] = ((32 + SALT_MIN) * 8) / 6;
|
||||
token.len_max[1] = ((32 + SALT_MAX) * 8) / 6;
|
||||
token.attr[1] = TOKEN_ATTR_VERIFY_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_BASE64A;
|
||||
|
||||
|
@ -75,8 +75,8 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
||||
token.attr[1] = TOKEN_ATTR_VERIFY_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_DIGIT;
|
||||
|
||||
token.len_min[2] = 0;
|
||||
token.len_max[2] = 36;
|
||||
token.len_min[2] = (SALT_MIN * 8) / 6;
|
||||
token.len_max[2] = (SALT_MAX * 8) / 6;
|
||||
token.sep[2] = '*';
|
||||
token.attr[2] = TOKEN_ATTR_VERIFY_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_BASE64A;
|
||||
|
@ -66,8 +66,8 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
||||
token.attr[0] = TOKEN_ATTR_FIXED_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_SIGNATURE;
|
||||
|
||||
token.len_min[1] = 88;
|
||||
token.len_max[1] = 428; // 428 = 64 + 256 where 64 is digest length and 256 is SALT_MAX
|
||||
token.len_min[1] = ((64 + SALT_MIN) * 8) / 6;
|
||||
token.len_max[1] = ((64 + SALT_MAX) * 8) / 6;
|
||||
token.attr[1] = TOKEN_ATTR_VERIFY_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_BASE64A;
|
||||
|
||||
|
@ -10,16 +10,19 @@ use warnings;
|
||||
|
||||
use Digest::MD5 qw (md5);
|
||||
|
||||
sub module_constraints { [[0, 255], [1, 11], [0, 33], [1, 11], [1, 33]] }
|
||||
sub module_constraints { [[0, 232], [0, 232], [0, 32], [0, 32], [0, 32]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
my $word = shift;
|
||||
my $salt = shift;
|
||||
|
||||
my $pass = sprintf ("%s:Administration Tools:%s", $salt, $word);
|
||||
# we need to reduce the maximum password and salt buffer size by 23 since we
|
||||
# add it here statically
|
||||
|
||||
my $hash_buf = md5 ($pass);
|
||||
my $final = sprintf ("%s:Administration Tools:%s", $salt, $word);
|
||||
|
||||
my $hash_buf = md5 ($final);
|
||||
|
||||
my $res = "";
|
||||
|
||||
|
@ -20,7 +20,9 @@ sub module_generate_hash
|
||||
# we need to reduce the maximum password and salt buffer size by 8 since we
|
||||
# add it here statically
|
||||
|
||||
my $digest = md5_hex ($salt . "\nskyper\n" . $word);
|
||||
my $final = sprintf ("%s\nskyper\n%s", $salt, $word);
|
||||
|
||||
my $digest = md5_hex ($final);
|
||||
|
||||
my $hash = sprintf ("%s:%s", $digest, $salt);
|
||||
|
||||
|
@ -11,7 +11,7 @@ use warnings;
|
||||
use Digest::MD5 qw (md5_hex);
|
||||
use Encode;
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 55], [0, 27]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 27], [0, 27]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -11,7 +11,7 @@ use warnings;
|
||||
use Digest::MD5 qw (md5_hex);
|
||||
use Encode;
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 55], [0, 27]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 27], [0, 27]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -10,7 +10,7 @@ use warnings;
|
||||
|
||||
use Digest::SHA qw (sha1_hex);
|
||||
|
||||
sub module_constraints { [[0, 255], [8, 8], [0, 55], [8, 8], [8, 55]] }
|
||||
sub module_constraints { [[0, 253], [8, 8], [0, 53], [8, 8], [8, 53]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -11,7 +11,7 @@ use warnings;
|
||||
use Digest::SHA1 qw (sha1_hex);
|
||||
use Encode;
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 55], [0, 27]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 27], [0, 27]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -11,7 +11,7 @@ use warnings;
|
||||
use Digest::SHA1 qw (sha1_hex);
|
||||
use Encode;
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 55], [0, 27]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 27], [0, 27]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -12,7 +12,7 @@ use Digest::SHA1 qw (sha1);
|
||||
use MIME::Base64 qw (encode_base64 decode_base64);
|
||||
use Encode;
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 55], [0, 27]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 27], [0, 27]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -10,7 +10,7 @@ use warnings;
|
||||
|
||||
use Digest::SHA qw (sha256_hex);
|
||||
|
||||
sub module_constraints { [[0, 255], [6, 6], [0, 55], [6, 6], [0, 55]] }
|
||||
sub module_constraints { [[0, 255], [6, 6], [0, 55], [6, 6], [6, 55]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -11,7 +11,7 @@ use warnings;
|
||||
use Digest::SHA qw (sha256_hex);
|
||||
use Encode;
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 55], [0, 27]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 27], [0, 27]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -11,7 +11,7 @@ use warnings;
|
||||
use Digest::SHA qw (sha256_hex);
|
||||
use Encode;
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 55], [0, 27]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 27], [0, 27]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -11,7 +11,7 @@ use warnings;
|
||||
use Digest::SHA qw (sha256);
|
||||
use Digest::HMAC qw (hmac_hex);
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 55], [0, 55], [0, 55]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 55], [0, 55], [-1, -1]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -11,7 +11,7 @@ use warnings;
|
||||
use Digest::SHA qw (sha256);
|
||||
use Digest::HMAC qw (hmac_hex);
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 55], [0, 55], [0, 55]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 55], [0, 55], [-1, -1]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -10,7 +10,7 @@ use warnings;
|
||||
|
||||
use Digest::SHA qw (sha512_hex);
|
||||
|
||||
sub module_constraints { [[0, 255], [8, 8], [0, 55], [8, 8], [0, 55]] }
|
||||
sub module_constraints { [[0, 255], [8, 8], [0, 55], [8, 8], [8, 55]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -11,7 +11,7 @@ use warnings;
|
||||
use Digest::SHA qw (sha512_hex);
|
||||
use Encode;
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 55], [0, 27]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 27], [0, 27]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -11,7 +11,7 @@ use warnings;
|
||||
use Digest::SHA qw (sha512_hex);
|
||||
use Encode;
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 55], [0, 27]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 27], [0, 27], [0, 27]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -11,7 +11,7 @@ use warnings;
|
||||
use Digest::SHA qw (sha512);
|
||||
use Digest::HMAC qw (hmac_hex);
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 55], [0, 55], [0, 55]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 55], [0, 55], [-1, -1]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
@ -11,7 +11,7 @@ use warnings;
|
||||
use Digest::SHA qw (sha512);
|
||||
use Digest::HMAC qw (hmac_hex);
|
||||
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 55], [0, 55], [0, 55]] }
|
||||
sub module_constraints { [[0, 255], [0, 255], [0, 55], [0, 55], [-1, -1]] }
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
|
Loading…
Reference in New Issue
Block a user