Gabriele Gristina
cf3ab8e2dc
Handle signed/unsigned PDF permission P value for all PDF hash-modes
1 year ago
Your Name
4dc96cd765
m25400 make use of new is_valid_printable
1 year ago
Your Name
6bc86d06b1
remove debug printfs, added changes.txt
1 year ago
Your Name
45b803988c
25400 working with 32 bytes plaintext check
1 year ago
Your Name
b01f4e5c2e
corrected ASCII plaintext check from >=20 to >=0x20
1 year ago
Gabriele Gristina
b0c6738289
Rename STR() to M2S(), part 2
2 years ago
Jens Steube
be75e4b4ea
Rename STR() to M2S() to avoid future collisions and move from kernel source to command line parameter
2 years ago
Gabriele Gristina
9d36245d51
Kernels: Set the default Address Space Qualifier for any pointer, refactored / updated KERN_ATTR macros and rc4 cipher functions, in order to support Apple Metal runtime
2 years ago
Gabriele Gristina
2e4a136758
Refactored standard kernel includes in order to support Apple Metal runtime, updated backend, test units and status code
2 years ago
Jens Steube
0abdcb1ae5
Rename GID_MAX to GID_CNT to avoid naming conflict with existing macro
2 years ago
Jens Steube
668d2179cd
Kernels: Refactored standard kernel declaration to use a structure holding u32/u64 attributes to reduce the number of attributes
2 years ago
philsmd
5ef522ed8f
whitespace and code style fixes
3 years ago
Your Name
db2e7d1391
m25400 can now recover both a owner-password and user-password (when set) based on a pdf's o-value
...
- added option to add the user-password to the pdf hash as an extra colum
- added pdf test files, both with and without a owner- and user-password
The main todo is to add a recovered user-password to back the hash that's written to the potfile.
Currently I'm printing a recovered password as "(user password=...) after the recovered owner-password.
Similair as the VC PIM is printed. However, this isn't most elegant.
A secondary todo is to verify a recovered user-password based on the u-value,
this could possibly simplify the check whether the recoverd password is a user-password or owner-password.
3 years ago
Jens Steube
8901e657a5
RC4 Kernels: Improved performance by 20%+ for hash-modes Kerberos 5 (etype 23), MS Office (<= 2003) and PDF (<= 1.6) by using new RC4 code
3 years ago
Your Name
4b24e91610
now we can crack the hash direct from pdf2john.pl, no need to alter it ourselves anymore
3 years ago
Your Name
d52f9c2cad
Added attack mode 25400 which cracks a pdf edit password. It's largely duplicate code of 10500. Based on https://hashcat.net/forum/thread-6233.html
3 years ago