Fixed false negative on Unit Test with hash-type 25400

pull/3119/head
Gabriele Gristina 2 years ago
parent dfd316c653
commit c48f044fb7

@ -25,6 +25,7 @@
- Fixed missing option flag OPTS_TYPE_SUGGEST_KG for hash-mode 11600 to inform the user about possible false positives in this mode - Fixed missing option flag OPTS_TYPE_SUGGEST_KG for hash-mode 11600 to inform the user about possible false positives in this mode
- Fixed undefined function call to hc_byte_perm_S() in hash-mode 17010 on non-CUDA compute devices - Fixed undefined function call to hc_byte_perm_S() in hash-mode 17010 on non-CUDA compute devices
- Fixed wordlist handling in -m 3000 when candidate passwords use the $HEX[...] syntax - Fixed wordlist handling in -m 3000 when candidate passwords use the $HEX[...] syntax
- Fixed false negative on Unit Test with hash-type 25400
## ##
## Technical ## Technical

@ -541,7 +541,7 @@ int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
pdf_t *pdf = (pdf_t *) esalt_buf; pdf_t *pdf = (pdf_t *) esalt_buf;
if (pdf->id_len == 32) if (pdf->id_len == 32)
{ {
line_len = snprintf (line_buf, line_size, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%s", line_len = snprintf (line_buf, line_size, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x%s",
pdf->V, pdf->V,
pdf->R, pdf->R,
128, 128,
@ -579,7 +579,7 @@ int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
} }
else else
{ {
line_len = snprintf (line_buf, line_size, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%s", line_len = snprintf (line_buf, line_size, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x%s",
pdf->V, pdf->V,
pdf->R, pdf->R,
128, 128,

@ -518,6 +518,11 @@ function attack_0()
search="${hash}:${pass}" search="${hash}:${pass}"
fi fi
if [ ${hash_type} -eq 25400 ]; then
tmp=$(echo $output | sed -e 's/ (user password[^)].*//g')
output="${tmp}"
fi
echo "${output}" | grep -F "${search}" >/dev/null 2>/dev/null echo "${output}" | grep -F "${search}" >/dev/null 2>/dev/null
if [ "${?}" -ne 0 ]; then if [ "${?}" -ne 0 ]; then

Loading…
Cancel
Save