jsteube
2fab28a6f3
Add some useful converters
2019-04-05 12:19:53 +02:00
jsteube
b8d609ba16
WPA/WPA2 cracking: In the potfile, replace password with PMK in order to detect already cracked networks across all WPA modes
2019-04-02 11:24:22 +02:00
jsteube
42e440611a
Fix some broken strict-aliasing rules
2019-03-17 11:09:32 +01:00
jsteube
5da1e4b872
Fixed maximum password length limit which was announced as 256 but actually was 255
2019-02-26 21:20:07 +01:00
jsteube
df1e00e4ed
Fix out-of-boundary reads in base32/base64 operations
2019-01-09 10:56:47 +01:00
jsteube
3848c73f80
Add decoder_apply_optimizer ()
...
Add encoder_apply_optimizer ()
Add decoder_apply_options ()
Add encoder_apply_options ()
2018-12-15 15:22:40 +01:00
jsteube
048298020e
All remaining parser functions have been rewritten to make use of input_tokenizer():
...
chacha20_parse_hash
crammd5_dovecot_parse_hash
electrum_wallet13_parse_hash
ethereum_pbkdf2_parse_hash
ethereum_presale_parse_hash
ethereum_scrypt_parse_hash
filevault2_parse_hash
filezilla_server_parse_hash
jks_sha1_parse_hash
jwt_parse_hash
mywalletv2_parse_hash
netbsd_sha1crypt_parse_hash
plaintext_parse_hash
tacacs_plus_parse_hash
tripcode_parse_hash
Removed old generic salt parser function parse_and_store_salt()
2018-07-20 11:00:39 +02:00
jsteube
9196f1ba55
Added rounds_count_length() function to detect optional rounds=
...
substring in *crypt hashes
The following parser functions have been rewritten to make use of
input_tokenizer():
phpass_parse_hash()
md5crypt_parse_hash()
md5apr1_parse_hash()
episerver_parse_hash()
2018-06-27 11:12:35 +02:00
jsteube
50824a24c6
Rewrite parse_and_store_salt from scratch and rename original to parse_and_store_salt_legacy() for migration phase
...
Rewrite several *_parse_hash() functions to use parse_and_store_generic_salt()
2018-06-25 11:36:09 +02:00
jsteube
5f83dd8620
Convert cisco4_parse_hash() to make use of input_tokenizer()
...
Convert lm_parse_hash() to make use of input_tokenizer()
2018-06-24 14:04:05 +02:00
jsteube
2abe8caf24
Convert bcrypt_parse_hash() to make use of input_tokenizer()
...
Add more code to input_tokenizer()
2018-06-23 22:32:49 +02:00
jsteube
60f2d413e0
Fix missing hexification for chars 0x00 - 0x1f
2018-06-14 20:06:56 +02:00
jsteube
ce4858f7a3
Rewritten printable_utf8() because the original one throws too many warnings with GCC 8
2018-06-13 16:42:33 +02:00
jsteube
05a01d3843
fix some datatypes
2018-02-08 19:13:29 +01:00
jsteube
ce0cee0ac4
Stick to original JWT format from jwt.io
2018-01-21 19:57:24 +01:00
Rosen Penev
0555613305
Remove else statement after return
...
Suggested by clang tidy
2017-11-04 23:43:33 -07:00
philsmd
f1c3f952ba
fixes show output of -m 9710, -m 9810 and -m 10410
2017-08-25 09:55:10 +02:00
philsmd
a4616e6c6d
fixes #1338 : hexify also all password of format $HEX[]
2017-08-21 09:14:49 +02:00
jsteube
a673aee037
Very hot commit, continue reading here:
...
This is a test commit using buffers large enough to handle both passwords and salts up to length 256.
It requires changes to the kernel code, which is not included in here.
It also requires some of the host code to be modified. Before we're going to modify kernel code to support the larger lengths I want to be
sure of:
1. Host code modification is ok (no overflows or underflows)
2. Passwords and Salts are printed correctly to status, outfile, show, left, etc.
3. Performance does not change (or only very minimal)
This is not a patch that supports actual cracking both passwords and salts up to length 256, but it can not fail anyway.
If if it does, there's no reason to continue to add support for both passwords and salts up to length 256.
2017-06-17 17:57:30 +02:00
magnum
291c9f22fe
Mute gcc 7.1.1 warnings about intentional fall-throughs. See #1264 .
2017-06-01 00:03:26 +02:00
Jens Steube
5ec763fa20
Let is_hexify() call is_valid_hex_string() for better verification
2017-02-19 14:51:45 +01:00
Jens Steube
dd55c1eb66
WPA: Changed format for outfile and potfile from essid:mac1:mac2 to hash:mac_ap:mac_sta:essid
...
Fixes https://github.com/hashcat/hashcat/issues/1113
2017-02-19 14:45:27 +01:00
jsteube
514fc0fe75
Switch hex_to_u32() to LE
...
Also fixes -m 11100 is_valid_hex_string()
2016-12-26 15:09:56 +01:00
jsteube
ceed66d50b
Switch hex_to_u64() to LE
2016-12-26 13:09:41 +01:00
jsteube
f0b287e838
Get rid of bin_to_hex_lower(), add u8_to_hex_lower(), u32_to_hex_lower() and u64_to_hex_lower()
2016-12-26 12:52:06 +01:00
jsteube
fa5b5d298d
Hash Parser: Improved error detection of invalid hex characters where hex character are expected
2016-12-23 14:57:46 +01:00
jsteube
1342cf2ce3
Use $HEX[...] in case the password includes the separater character, increases potfile reading performance
2016-12-09 14:54:13 +01:00
Rosen Penev
03efea645f
More sign fixes
2016-11-16 21:17:28 -08:00
Rosen Penev
bd780a3729
Fix a few float conversion errors
2016-11-12 15:20:38 -08:00
jsteube
2507f62722
Add hash-mode option OPTS_TYPE_PT_ALWAYS_ASCII to control need_hexify() from interface.c
2016-11-05 14:46:00 +01:00
magnum
7d7ca48704
Change need_hexify so it optionally tests for printable UTF-8 as opposed
...
to printable ASCII.
2016-11-05 13:36:55 +01:00
jsteube
3442892fda
Use __attribute__ ((format (printf, 2, 3))) to help compiler to identify format strings
2016-10-31 09:19:37 +01:00
jsteube
180bdba7ac
Limit exec_hexify() to max 31 chars to be able to add 0 byte
2016-10-04 23:29:15 +02:00
jsteube
72fdc6a527
Limit exec_hexify() to max 32 chars
2016-10-04 23:25:35 +02:00
jsteube
eeb8210951
Added the current first and last password candidate test queued for execution per device on status view
2016-10-04 18:30:00 +02:00
jsteube
892eccfd14
Fix some missing sign conversions
2016-09-30 18:39:31 +02:00
jsteube
a0f6ed6832
Introduce hashes_t; not finishe yet
2016-09-16 17:01:18 +02:00
jsteube
3daf0af480
Added docs/credits.txt
...
Added docs/team.txt
2016-09-11 22:20:15 +02:00
jsteube
f9e1329ca9
Fix CRLF
2016-09-07 12:45:08 +02:00
jsteube
3dc77ced14
More preparation for easier integration of:
...
* https://github.com/hashcat/hashcat/pull/485
* https://github.com/hashcat/hashcat/pull/486
2016-09-06 11:49:26 +02:00