1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-12-27 08:58:10 +00:00
Commit Graph

40 Commits

Author SHA1 Message Date
jsteube
2fab28a6f3 Add some useful converters 2019-04-05 12:19:53 +02:00
jsteube
b8d609ba16 WPA/WPA2 cracking: In the potfile, replace password with PMK in order to detect already cracked networks across all WPA modes 2019-04-02 11:24:22 +02:00
jsteube
42e440611a Fix some broken strict-aliasing rules 2019-03-17 11:09:32 +01:00
jsteube
5da1e4b872 Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
jsteube
df1e00e4ed Fix out-of-boundary reads in base32/base64 operations 2019-01-09 10:56:47 +01:00
jsteube
3848c73f80 Add decoder_apply_optimizer ()
Add encoder_apply_optimizer ()
Add decoder_apply_options ()
Add encoder_apply_options ()
2018-12-15 15:22:40 +01:00
jsteube
048298020e All remaining parser functions have been rewritten to make use of input_tokenizer():
chacha20_parse_hash
crammd5_dovecot_parse_hash
electrum_wallet13_parse_hash
ethereum_pbkdf2_parse_hash
ethereum_presale_parse_hash
ethereum_scrypt_parse_hash
filevault2_parse_hash
filezilla_server_parse_hash
jks_sha1_parse_hash
jwt_parse_hash
mywalletv2_parse_hash
netbsd_sha1crypt_parse_hash
plaintext_parse_hash
tacacs_plus_parse_hash
tripcode_parse_hash
Removed old generic salt parser function parse_and_store_salt()
2018-07-20 11:00:39 +02:00
jsteube
9196f1ba55 Added rounds_count_length() function to detect optional rounds=
substring in *crypt hashes
The following parser functions have been rewritten to make use of
input_tokenizer():
phpass_parse_hash()
md5crypt_parse_hash()
md5apr1_parse_hash()
episerver_parse_hash()
2018-06-27 11:12:35 +02:00
jsteube
50824a24c6 Rewrite parse_and_store_salt from scratch and rename original to parse_and_store_salt_legacy() for migration phase
Rewrite several *_parse_hash() functions to use parse_and_store_generic_salt()
2018-06-25 11:36:09 +02:00
jsteube
5f83dd8620 Convert cisco4_parse_hash() to make use of input_tokenizer()
Convert lm_parse_hash() to make use of input_tokenizer()
2018-06-24 14:04:05 +02:00
jsteube
2abe8caf24 Convert bcrypt_parse_hash() to make use of input_tokenizer()
Add more code to input_tokenizer()
2018-06-23 22:32:49 +02:00
jsteube
60f2d413e0 Fix missing hexification for chars 0x00 - 0x1f 2018-06-14 20:06:56 +02:00
jsteube
ce4858f7a3 Rewritten printable_utf8() because the original one throws too many warnings with GCC 8 2018-06-13 16:42:33 +02:00
jsteube
05a01d3843 fix some datatypes 2018-02-08 19:13:29 +01:00
jsteube
ce0cee0ac4 Stick to original JWT format from jwt.io 2018-01-21 19:57:24 +01:00
Rosen Penev
0555613305 Remove else statement after return
Suggested by clang tidy
2017-11-04 23:43:33 -07:00
philsmd
f1c3f952ba
fixes show output of -m 9710, -m 9810 and -m 10410 2017-08-25 09:55:10 +02:00
philsmd
a4616e6c6d
fixes #1338: hexify also all password of format $HEX[] 2017-08-21 09:14:49 +02:00
jsteube
a673aee037 Very hot commit, continue reading here:
This is a test commit using buffers large enough to handle both passwords and salts up to length 256.
It requires changes to the kernel code, which is not included in here.
It also requires some of the host code to be modified. Before we're going to modify kernel code to support the larger lengths I want to be
sure of:
1. Host code modification is ok (no overflows or underflows)
2. Passwords and Salts are printed correctly to status, outfile, show, left, etc.
3. Performance does not change (or only very minimal)
This is not a patch that supports actual cracking both passwords and salts up to length 256, but it can not fail anyway.
If if it does, there's no reason to continue to add support for both passwords and salts up to length 256.
2017-06-17 17:57:30 +02:00
magnum
291c9f22fe Mute gcc 7.1.1 warnings about intentional fall-throughs. See #1264. 2017-06-01 00:03:26 +02:00
Jens Steube
5ec763fa20 Let is_hexify() call is_valid_hex_string() for better verification 2017-02-19 14:51:45 +01:00
Jens Steube
dd55c1eb66 WPA: Changed format for outfile and potfile from essid:mac1:mac2 to hash:mac_ap:mac_sta:essid
Fixes https://github.com/hashcat/hashcat/issues/1113
2017-02-19 14:45:27 +01:00
jsteube
514fc0fe75 Switch hex_to_u32() to LE
Also fixes -m 11100 is_valid_hex_string()
2016-12-26 15:09:56 +01:00
jsteube
ceed66d50b Switch hex_to_u64() to LE 2016-12-26 13:09:41 +01:00
jsteube
f0b287e838 Get rid of bin_to_hex_lower(), add u8_to_hex_lower(), u32_to_hex_lower() and u64_to_hex_lower() 2016-12-26 12:52:06 +01:00
jsteube
fa5b5d298d Hash Parser: Improved error detection of invalid hex characters where hex character are expected 2016-12-23 14:57:46 +01:00
jsteube
1342cf2ce3 Use $HEX[...] in case the password includes the separater character, increases potfile reading performance 2016-12-09 14:54:13 +01:00
Rosen Penev
03efea645f
More sign fixes 2016-11-16 21:17:28 -08:00
Rosen Penev
bd780a3729
Fix a few float conversion errors 2016-11-12 15:20:38 -08:00
jsteube
2507f62722 Add hash-mode option OPTS_TYPE_PT_ALWAYS_ASCII to control need_hexify() from interface.c 2016-11-05 14:46:00 +01:00
magnum
7d7ca48704 Change need_hexify so it optionally tests for printable UTF-8 as opposed
to printable ASCII.
2016-11-05 13:36:55 +01:00
jsteube
3442892fda Use __attribute__ ((format (printf, 2, 3))) to help compiler to identify format strings 2016-10-31 09:19:37 +01:00
jsteube
180bdba7ac Limit exec_hexify() to max 31 chars to be able to add 0 byte 2016-10-04 23:29:15 +02:00
jsteube
72fdc6a527 Limit exec_hexify() to max 32 chars 2016-10-04 23:25:35 +02:00
jsteube
eeb8210951 Added the current first and last password candidate test queued for execution per device on status view 2016-10-04 18:30:00 +02:00
jsteube
892eccfd14 Fix some missing sign conversions 2016-09-30 18:39:31 +02:00
jsteube
a0f6ed6832 Introduce hashes_t; not finishe yet 2016-09-16 17:01:18 +02:00
jsteube
3daf0af480 Added docs/credits.txt
Added docs/team.txt
2016-09-11 22:20:15 +02:00
jsteube
f9e1329ca9 Fix CRLF 2016-09-07 12:45:08 +02:00
jsteube
3dc77ced14 More preparation for easier integration of:
* https://github.com/hashcat/hashcat/pull/485
* https://github.com/hashcat/hashcat/pull/486
2016-09-06 11:49:26 +02:00