mirror of https://github.com/hashcat/hashcat.git
I've tested this with Linux and Msys2. I hope it will work on FreeBSD, OSX and Cygwin as well. There's also four new dedicated makefile targets for install: install_library install_hashcat install_docs install_shared Also the main_shared.c and its makefile target have been removed, as the main frontend is the best example possiblepull/938/head
parent
83151ec2bb
commit
d2c76d9320
@ -1,114 +0,0 @@
|
||||
/**
|
||||
* Author......: See docs/credits.txt
|
||||
* License.....: MIT
|
||||
*/
|
||||
|
||||
#include "common.h"
|
||||
|
||||
#include <stdio.h>
|
||||
#include <assert.h>
|
||||
|
||||
#include "types.h"
|
||||
#include "memory.h"
|
||||
#include "user_options.h"
|
||||
#include "hashcat.h"
|
||||
|
||||
static void main_cracker_hash_cracked (MAYBE_UNUSED hashcat_ctx_t *hashcat_ctx, MAYBE_UNUSED const void *buf, MAYBE_UNUSED const size_t len)
|
||||
{
|
||||
outfile_ctx_t *outfile_ctx = hashcat_ctx->outfile_ctx;
|
||||
|
||||
if (outfile_ctx->fp != NULL) return; // cracked hash was not written to an outfile
|
||||
|
||||
fwrite (buf, len, 1, stdout);
|
||||
fwrite (EOL, strlen (EOL), 1, stdout);
|
||||
}
|
||||
|
||||
static void event (const u32 id, hashcat_ctx_t *hashcat_ctx, const void *buf, const size_t len)
|
||||
{
|
||||
switch (id)
|
||||
{
|
||||
case EVENT_CRACKER_HASH_CRACKED: main_cracker_hash_cracked (hashcat_ctx, buf, len); break;
|
||||
}
|
||||
}
|
||||
|
||||
int main (MAYBE_UNUSED int argc, MAYBE_UNUSED char **argv)
|
||||
{
|
||||
// hashcat main context
|
||||
|
||||
hashcat_ctx_t *hashcat_ctx = (hashcat_ctx_t *) malloc (sizeof (hashcat_ctx_t));
|
||||
|
||||
assert (hashcat_ctx);
|
||||
|
||||
const int rc_hashcat_init = hashcat_init (hashcat_ctx, event);
|
||||
|
||||
if (rc_hashcat_init == -1) return -1;
|
||||
|
||||
// this is a bit ugly, but it's the example you're looking for
|
||||
|
||||
char *hash = "8743b52063cd84097a65d1633f5c74f5";
|
||||
char *mask = "?l?l?l?l?l?l?l";
|
||||
|
||||
char *hc_argv[] = { hash, mask, NULL };
|
||||
|
||||
// initialize the user options with some defaults (you can override them later)
|
||||
|
||||
const int rc_options_init = user_options_init (hashcat_ctx);
|
||||
|
||||
if (rc_options_init == -1) return -1;
|
||||
|
||||
// your own stuff
|
||||
|
||||
user_options_t *user_options = hashcat_ctx->user_options;
|
||||
|
||||
user_options->hc_argv = hc_argv;
|
||||
user_options->hc_argc = 2;
|
||||
user_options->quiet = true;
|
||||
user_options->potfile_disable = true;
|
||||
user_options->attack_mode = ATTACK_MODE_BF; // this is -a 3
|
||||
user_options->hash_mode = 0; // MD5
|
||||
user_options->workload_profile = 3;
|
||||
|
||||
// init a hashcat session; this initializes opencl devices, hwmon, etc
|
||||
// it does not actually run the attack but from here you can access opencl devices and hwmon information
|
||||
|
||||
const int rc_init = hashcat_session_init (hashcat_ctx, NULL, NULL, 0, NULL, 0);
|
||||
|
||||
if (rc_init == 0)
|
||||
{
|
||||
// this one actually starts the cracking
|
||||
|
||||
const int rc_run = hashcat_session_execute (hashcat_ctx);
|
||||
|
||||
if (rc_run == 0)
|
||||
{
|
||||
hashcat_status_t hashcat_status;
|
||||
|
||||
hashcat_get_status (hashcat_ctx, &hashcat_status);
|
||||
|
||||
printf ("Session: %s\n", hashcat_status.session);
|
||||
printf ("Status: %s\n", hashcat_status.status_string);
|
||||
}
|
||||
else if (rc_run == -1)
|
||||
{
|
||||
char *msg = hashcat_get_log (hashcat_ctx);
|
||||
|
||||
fprintf (stderr, "%s\n", msg);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
char *msg = hashcat_get_log (hashcat_ctx);
|
||||
|
||||
fprintf (stderr, "%s\n", msg);
|
||||
}
|
||||
|
||||
// always destroy those regardless of what the returncodes from the init functions are
|
||||
|
||||
hashcat_session_destroy (hashcat_ctx);
|
||||
|
||||
hashcat_destroy (hashcat_ctx);
|
||||
|
||||
free (hashcat_ctx);
|
||||
|
||||
return 0;
|
||||
}
|
Loading…
Reference in new issue