1
0
mirror of https://github.com/hashcat/hashcat.git synced 2025-08-05 13:25:39 +00:00
Commit Graph

1217 Commits

Author SHA1 Message Date
Gabriele Gristina
1cc8ed779e
get rid of Crypt::GCrypt 2025-07-12 20:00:43 +02:00
Gabriele Gristina
e8686b3e3e
Update tools/install_modules.sh: force install/update Digest::BLAKE2 2025-07-12 19:32:09 +02:00
Gabriele Gristina
638aaa902a
Update tools/install_modules.sh: using bash instead of sh, fix unclosed double quote 2025-07-12 19:28:29 +02:00
Gabriele Gristina
63377a9890
Update tools/install_modules.sh: make pyenv works with Apple Intel, use pycryptodome instead of pycrypto, add missing Module::Build::Pluggable::XSUtil 2025-07-12 19:18:37 +02:00
Gabriele Gristina
b5202e4be6
add pyenv usage to install python3 deps inside virtualenv 2025-07-12 17:16:00 +02:00
Gabriele Gristina
bfa5b3e610
Unit tests: Updated install_modules.sh to use an external package for pygost, due to not available anymore 2025-07-12 14:57:40 +02:00
Gabriele Gristina
08d84f5f90
Unit tests: Updated install_modules.sh to use cpanm instead of cpan 2025-07-12 14:21:18 +02:00
Gabriele Gristina
7376f36c02
Merge branch 'master' into fix_1800_Apple 2025-07-12 13:01:38 +02:00
Gabriele Gristina
c6c87d2cb2
Unit tests: Updated install_modules.sh with Crypt::Passwd::XS, to test suite works also on Apple (ex: 1800) 2025-07-12 12:55:06 +02:00
Gabriele Gristina
3f79a20429
Unit tests: Updated install_modules.sh to use an external module for Digest::BLAKE2, due to maintenance being discontinued 2025-07-12 12:22:40 +02:00
hashcat-bot
56dd7f7e2b
Merge pull request #4325 from matrix/fix_31000
Fixed bug in module_constraints for hash-mode 31000
2025-07-12 10:45:39 +02:00
Gabriele Gristina
f3adb3c318
Fixed bug in module_constraints for hash-mode 31000 2025-07-12 08:54:15 +02:00
hashcat-bot
6eb6ca96c3
Merge pull request #4323 from matrix/fix_15000
Fixed bug in module_constraints for hash-mode 15000
2025-07-12 06:57:54 +02:00
hashcat-bot
f7161e010c
Merge pull request #4322 from matrix/fix_11100
Fixed bug in module_constraints for hash-mode 11100
2025-07-12 06:57:40 +02:00
hashcat-bot
a69e15d0c7
Merge pull request #4321 from matrix/fix_10100
Fixed bug in module_constraints for hash-mode 10100
2025-07-12 06:57:20 +02:00
hashcat-bot
22baf292fe
Merge pull request #4320 from matrix/fix_8700
Fixed bug in module_constraints for hash-mode 8700
2025-07-12 06:57:06 +02:00
hashcat-bot
900bd0b74e
Merge branch 'master' into fix_7801 2025-07-12 06:56:20 +02:00
hashcat-bot
88b007f59a
Merge pull request #4318 from matrix/fix_7800
Fixed bug in module_constraints and kernel for hash-mode 7800
2025-07-12 06:55:31 +02:00
Gabriele Gristina
ddf99ca69d
Fixed bug in module_constraints for hash-mode 15000 2025-07-12 02:39:31 +02:00
Gabriele Gristina
84cc247fc6
Fixed bug in module_constraints for hash-mode 11100 2025-07-12 02:20:53 +02:00
Gabriele Gristina
9806b7d615
Fixed bug in module_constraints for hash-mode 10100 2025-07-12 02:07:17 +02:00
Gabriele Gristina
4567acd5f0
Fixed bug in module_constraints for hash-mode 8700 2025-07-12 01:59:45 +02:00
Gabriele Gristina
dc3418eaa4
Fixed bug in module_constraints and kernel for hash-mode 7801 2025-07-12 01:49:22 +02:00
Gabriele Gristina
dbd41ca750
Fixed bug in module_constraints and kernel for hash-mode 7800 2025-07-12 01:35:25 +02:00
Gabriele Gristina
894ded7e14
Modified 'edge' arguments
Improved argument handling
Added --backend-devices-keepfree option
Supported multiple Attack Type filter (ex: -a 0,3)
Supported multiple Device ID filter (ex: -d 1,2)
Supported multiple Device-Type ID filter (ex: -D 1,2)
Supported multiple verbose levels
2025-07-12 00:31:19 +02:00
Gabriele Gristina
063618f699
fix edge testing with password type HEX 2025-07-11 20:41:12 +02:00
hashcat-bot
5322bec828
Merge pull request #4112 from matrix/issue_3652_v2
Added hash-mode: md5(md5(md5($pass.$salt1)).$salt2)
2025-07-11 19:58:16 +02:00
Jens Steube
d7fb2ffa06 Fixed both a false positive and a false negative in -m 21800. Previously,
only the first hash in a multihash list was marked as cracked, regardless
of which hash was actually cracked. For example, if the second hash was
cracked, it incorrectly marked the first as cracked and left the second
uncracked. This issue only affected beta versions and only in multihash
cracking mode.

Added deep-comp kernel support for Kerberos modes 28800 and 28900,
enabling multihash cracking for the same user in the same domain, even if
the password was changed or the recording was bad.

Added a rule ensuring that device buffer sizes for password candidates,
hooks, and transport (tmps) must be smaller than 1/4 of the maximum
allocatable memory. If not, hashcat now automatically reduces kernel-accel
down to 1, then halves the number of threads and restores kernel-accel up
to its maximum, repeating until the size requirement is met.

Fixed salt length limit verification for -m 20712.

Fixed password length limit for -m 14400.

Fixed unit test salt generator for -m 21100, which could produce duplicate
hashes under certain conditions.

Added the OPTS_TYPE_NATIVE_THREADS flag to the following hash modes
(after benchmarking): 7700, 7701, 9000, 1375x, 1376x, 14800, 19500, 23900.
2025-07-11 15:02:58 +02:00
hashcat-bot
d82056dbe6
Merge pull request #4309 from matrix/constaints_400
fix module_constraints (Optimized-Mode-PW-Constraints) for -m 400
2025-07-11 07:41:21 +02:00
hashcat-bot
53403f429d
Merge pull request #4310 from matrix/fix_3100
fix min salt (username) len with hash-mode 3100
2025-07-11 07:41:00 +02:00
Gabriele Gristina
6200d3cc59
fix min salt (username) len with hash-mode 3100 2025-07-10 23:25:03 +02:00
Gabriele Gristina
a5fd16d9cd
fix module_constraints (Optimized-Mode-PW-Constraints) for -m 400 2025-07-10 23:10:04 +02:00
hashcat-bot
e90e158cb0
Merge pull request #3952 from its5Q/master
Add dynamic iteration count support for hashmodes 26600 and 26610 (Metamask)
2025-07-10 21:23:49 +02:00
hashcat-bot
4cdda7c208
Merge pull request #4139 from zyronix/feature/keybag2hashcat
Adding keybag2hashcat.py script
2025-07-10 21:16:21 +02:00
Jens Steube
a8bafcc64e
Merge pull request #4076 from holly-o/master
Added bitlocker2hashcat.py
2025-07-10 21:12:30 +02:00
Jens Steube
5d62c9fe73
Merge pull request #4158 from holly-o/apfs2hashcat_pr
Add apfs2hashcat.py
2025-07-10 21:07:41 +02:00
Gabriele Gristina
5a5824ea59
Introduced the 'edge' test type in test.pl along with its corresponding tool, test_edge.sh
Hashcat is evolving, both in its core and in the supported algorithms.
To uncover bugs in the code, I implemented edge case testing to verify the settings defined in the specific algorithm test modules (e.g., m00000.pm), as well as the behavior of the kernels (pure and optimized) in relation to the different attack modes (-a0, -a1, etc.).
2025-07-09 23:19:49 +02:00
hashcat-bot
d1b36ea184
Merge pull request #4154 from unix-ninja/master
Add gitea2hashcat.py
2025-07-09 15:59:07 +02:00
hashcat-bot
7965e85dd6
Merge pull request #4211 from technion/vmxregex
Syntax error from vmwarevmx2hashcat
2025-07-09 10:38:59 +02:00
Jens Steube
290360ee55 Merge PR #4189 with minor edits 2025-07-09 09:14:21 +02:00
Jens Steube
c4c4a9fdc5 Merge PR #4194 2025-07-09 09:10:33 +02:00
Jens Steube
853b149561 Argon2: add early support for multihash mixed mode cracking
This commit introduces initial support for mixed mode multihash cracking
in Argon2. Although I was skeptical at first, the final solution turned
out better than expected with only a minimal speed loss (1711H/s ->
1702H/s).

Unit tests have been updated to generate random combinations of
Argon2-I/D/ID with randomized m, t, and p values. So far, results look
solid.

Note: This is a complex change and may have undiscovered edge cases.

Some optimization opportunities remain. JIT-based optimizations are not
fully removed. We could also detect single-hash scenarios at runtime
and disable self-tests to re-enable JIT. Currently, the kernel workload
is sized based on the largest hash to avoid out-of-bound memory access.
2025-07-08 20:46:16 +02:00
Gabriele Gristina
bcc351068f
Metal Backend:
- added support to 2D/3D Compute
- improved compute workloads calculation
Makefile:
- updated MACOSX_DEPLOYMENT_TARGET to 15.0
Unit tests:
- updated install_modules.sh with Crypt::Argon2

Argon2 start works with Apple Metal
2025-07-03 22:06:32 +02:00
Jens Steube
d9918d7e44 Add Argon2 support for OpenCL and HIP
=====================================

This patch modifies the existing Argon2 plugin, which was initially
designed to work only with CUDA. Supporting OpenCL and HIP required
broader architectural changes.

1. The tmps[] structure no longer holds the "large buffer". This
buffer stored the scratch areas for all password candidates in one
chunk. But we do not need to hold scratch areas for all candidates
simultaneously. All we need to do is hold chunks large enough
per password.

To simplify logic, the buffer is not divided by password count, but
divided by four, which fits within the "1/4 global memory" limit on
some OpenCL runtimes.

Hashcat already had logic to support this, but the buffer needed to be
moved to a different buffer type. It has now been relocated from the
"tmp buffer" to the "extra tmp buffer", following the same strategy
used in newer SCRYPT plugins.

This improves handling across several subcomponents:

  - Hashcat backend divides into four asymmetric buffers, hence the
    name "4-buffer strategy"
  - If the candidate count isn't divisible by 4, leftover candidates are
    assigned to the first (and possibly second and third) buffer
  - No code in the plugin is required, as this was designed for exactly
    such cases where future algorithms require a lot of memory
  - Plugin was rewritten to report the size needed in
    module_extra_tmp_size(), which triggers the "4-buffer" strategy
  - The split is not even, but each part is large enough to hold
    a multiple of a full scratch buffer for a password
  - The kernel code in m34000_init/loop/comp now uses a code block
    that finds its buffer by doing "group_id % 4"
  - Prevents the need to over-allocate memory to avoid OOB access
  - The original "tmps buffer" now holds a small dummy state buffer

2. Replaced warp shuffle instruction

The instruction __shfl_sync() is not available in runtimes
other than CUDA. Some have alternatives, some do not.

To prevent branching per backend runtime, the new general macro
hc__shfl_sync() replaces all calls to __shfl_sync().
This allows us to implement runtime-specific solutions and
take effect at compile time to prevent regressions.

- CUDA:
  We simply map to the original __shfl_sync()

- HIP:
  We map to shfl(), a built-in intrinsic. This instruction doesn't
  support masks like __shfl_sync() does, but masks are not needed
  in Argon2 anyway. It requires an additional parameter, the wavefront
  size. This is natively 64, but we hardcode this to 32 so it aligns
  with NVIDIA's warp size.

- OpenCL:
  - AMD: We have access to the instruction __builtin_amdgcn_ds_bpermute().
    This instruction only supports 32-bit integers, requiring us to
    pack and unpack the 64-bit values manually
  - NVIDIA: We use inline assembly with "shfl.sync.idx.b32". Same as
    with AMD, we need to pack and unpack 32-bit integers. The 64-bit
    support in CUDA is just overloaded and internally does the same thing.
  - Others: We use a shared memory pool and combine it with a barrier.
    This LOCAL_VK pool must be sized at compile time and transported to
    the Argon2 code in "inc_hash_argon2.cl". This required changing all
    function declarations that use shuffles slightly.

Unlock full threading for init and comp kernels
===============================================

This is implemented using a new flag:
  OPTS_TYPE_THREAD_MULTI_DISABLE

Behavior is similar to:
  OPTS_TYPE_MP_MULTI_DISABLE

It simply disables the multiplier normally applied to password batch size.

But attention, this change completely unbinds this effect from the
real threads spawned on the compute device. If the thread count is not
set to 1 in the plugin, it will start autotuning it.

In the case of Argon2, we hard-code it to 32 instead, which also changes
how "warp size" was used in the original implementation, and which is not
compatible with HIP and/or OpenCL. However, we need to maintain this thread
size to utilize warp shuffle and its alternatives in other runtimes.

Benefits:

  - Enables full threading for init and comp kernels (1667 H/s to 1722 H/s)
  - Allows future algorithms to enable parallel processing of single
    password candidates, if supported

Plugin changes:

  - Removed the "hack" where thread count = 1 disabled the multiplier
  - Removed per-device warp count detection code and struct changes
  - Removed warp handling and "num_elements / thread_count" division in
    the run_kernel() function

Simplified autotune logic for Argon2
====================================

The goal is to calculate the maximum number of password candidates that
can run in parallel, constrained only by device memory.

  - Removed all code related to Argon2 from autotune
  - Implemented in "module_extra_tuningdb_block()" (like SCRYPT)
  - We create a tuningdb entry at runtime!
  - Still allows override via tuningdb or CLI
  - Considers register spilling (read at startup)
  - Prevents global-to-host memory swap performance issues

Add Argon2I and ArgonD support
==============================

The kernel prepared from NFI already had support for the different Argon
types. No change was needed.

To support the other Argon2 types, the tokenizer had to be improved to
support a variety of different signatures in the same hash-mode.

Bugfixes
========

- Fixed missing entries in "switch_buffer_by_offset_8x4_le_S()"
- Fixed benchmark hash misdetection for scrypt. This was due to
  outdated logic used in scrypt to detect whether the plugin was
  called from a benchmark session or a regular one
- Fixed a bug in "module_hash_encode()" where Base64 padding '=' was
  retained
- Fixed missing "GLOBAL_AS" / "PRIVATE_AS" casts for OpenCL
- Fixed compiler warnings (e.g., "index_u32x4()", "get_group_id()")
  by adding return values
- Fixed a bug in token.len_max[6], which was allowing decoding
  of a 256-byte data into a 16-byte buffer (digest)

Other improvements
==================

- Added unit test module for automated testing
- Added support to the tokenizer to allow multiple signatures.
  Leave out TOKEN_ATTR_FIXED_LENGTH to enable this in your plugins
- Updated "hc_umulhi()", also exists for HIP
- Renamed "gid" to "bid" when using "get_group_id()" for clarity
- Removed "#ifdef IS_CUDA" as all backends are now supported
- Removed deprecated "OPTS_TYPE_MAXIMUM_ACCEL" attribute

Performance note
================

For testing, I used the self-test hash configured according to the
RFC 9106 recommendation: m=65536, t=3, p=1.

In my benchmarks, the AMD RX 7900 XTX achieved 1401 H/s using the same
hash that was used to test NVIDIA's RTX 4090. The RTX 4090 reached
1722 H/s, making it faster in absolute terms. However, at the time of
writing, it is more than three times as expensive as the 7900 XTX.

It's also worth noting that an older NVIDIA GTX 1080 Ti still reached
565 H/s with the same test vector, and may be found at significantly
lower cost.

Across all tested Argon2 configurations, the performance gap between
the RX 7900 XTX and the RTX 4090 remained proportionally consistent,
indicating a clear linear scaling relationship between the two GPUs.
2025-07-02 11:02:57 +02:00
Jens Steube
0c2ed0d199 Update plugins that benefit from an artificially limited register count (NVIDIA).
Update default hash settings to 64MiB:3:4 for Argon2 in -m 70000, following RFC 9106 recommendations.
Add option OPTS_TYPE_THREAD_MULTI_DISABLE: allows plugin developers to disable scaling the password candidate batch size based on device thread count. This can be useful for super slow hash algorithms that utilize threads differently, e.g., when the algorithm allows parallelization. Note: thread count for the device can still be set normally.
Add options OPTI_TYPE_SLOW_HASH_DIMY_INIT/LOOP/COMP: enable 2D launches for slow hash init/loop/comp kernel with dimensions X and Y. The Y value must be set via salt->salt_dimy attribute.
Change autotune kernel-loops start value to the lowest multiple of the target hash iteration count, if kernel_loops_min permits.
Fixed a bug in autotune where kernel_threads_max was not respected during initial init and loop-prepare kernel runs.
2025-06-29 14:39:14 +02:00
Gabriele Gristina
db82714d3f
Merge remote-tracking branch 'upstream/master' into issue_3652_v2 2025-06-26 22:05:53 +02:00
Gabriele Gristina
a5e472c12e
Merge remote-tracking branch 'upstream/master' into issue_4191 2025-06-26 21:43:40 +02:00
Gabriele Gristina
a3afca56b8
Merge remote-tracking branch 'upstream/master' into ripemd320 2025-06-26 21:37:40 +02:00
Jens Steube
3182af1bc9 - Renamed shuffle() in inc_hash_scrypt.cl to avoid name collision with
shuffle() present in some OpenCL runtimes
- Updated autotune logic: if the best kernel-loop is not yet found and
  the current kernel-loops setting resulting in a kernel runtime which
  is already above a certain threshold, do not skip to kernel-threads
  or kernel-accel section if no variance is possible
- Revised all plugin module_unstable_warning() checks for
  AMD Radeon Pro W5700X GPU on Metal: rechecked with the latest
  Metal version and removed those now fixed
- Inform the user on startup when backend runtimes and devices are
  initialized
- Fixed some file permissions in the tools/ folder
2025-06-26 19:36:06 +02:00
Jens Steube
62a5a85dd6 Added 'next_power_of_two()' and moved both 'next_power_of_two()' and 'previous_power_of_two()' to 'shared.c'
Improved autotuner tweak logic and added boundary checks for accel and threads
Fixed available host memory detection on Windows
Fixed compilation error in MSYS2 native shell
Introduced an 8 GiB host memory usage limit per GPU, even if more is available
Replaced fixed-size host memory detection per GPU with a dynamic kernel-accel based method (similar to GPU memory detection)
Disabled hash-mode autodetection in the python bridge
Removed default invocation of 'rocm-smi' in 'benchmark_deep.pl' to avoid skewed initial results
Reduced default runtime in 'benchmark_deep.pl' scripts due to improved benchmark accuracy in hashcat in general
2025-06-25 11:21:51 +02:00