1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-26 09:58:16 +00:00
Commit Graph

5030 Commits

Author SHA1 Message Date
Jens Steube
471a8cccaf Update license 2019-01-02 00:02:12 +01:00
Jens Steube
1493bc01cf
Merge pull request #1829 from Naufragous/office-bug
Allow cracking non-unique salts for Office 2013
2018-12-18 14:39:08 +01:00
R. Yushaev
393916c0bf Allow cracking non-unique salts for Office 2013
With hash-mode 9600 (MS Office 2013) there can be multiple hashes with
the same salt but with different encryption verifiers in esalt_bufs.
This commit adds the functionality to execute _comp kernels for
different hashes after deriving their common key once.

Fixes #1826
2018-12-18 14:32:56 +01:00
Jens Steube
dbbba1fbdf
Merge pull request #1822 from Naufragous/odf-cracking
Add support for Open Document Format 1.1
2018-12-14 15:31:38 +01:00
R. Yushaev
b5a7e967c1 Add support for Open Document Format 1.1
Contains a kernel for the ODF 1.1 encryption implemented in OpenOffice.
The algorithm uses a SHA-1 checksum, a PBKDF2-HMAC-SHA1 key derivation
with 1024 iterations and Blowfish-CFB encryption.

Valid hashes can be extracted with the libreoffice2john.py script,
available from the John the Ripper Jumbo repository at
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/libreoffice2john.py

You have to remove the filename suffix at the end of the hash before
passing it to hashcat. Also see 'hashcat -m18600 --example-hashes'.

You can leave the filename prefix if you use the --username option to
process those hashes.

 - Add hash-mode 18600 (Open Document Format (ODF) 1.1 (SHA-1, Blowfish))
 - Tests: add hash-mode 18600 (Open Document Format (ODF) 1.1 (SHA-1, Blowfish))
2018-12-14 13:23:52 +01:00
Jens Steube
d6c04c2daf
Merge pull request #1821 from Naufragous/odf-fix
Fix selftest for hash-mode 18400
2018-12-14 13:15:23 +01:00
R. Yushaev
875d6eb516 Fix selftest for hash-mode 18400 2018-12-14 13:09:54 +01:00
Jens Steube
478fd2c8cf
Merge pull request #1815 from s3inlc/test-compatibility
Changed cat -A to cat -vet in test.sh
2018-12-13 14:21:31 +01:00
Jens Steube
376baa2b10
Merge pull request #1814 from s3inlc/algorithm/1652
Added hash mode 18500 sha1(md5(md5($pass)))
2018-12-13 14:21:22 +01:00
Jens Steube
7e0c551dc9
Merge pull request #1813 from philsmd/master
fixed validation of the --brain-client-features value
2018-12-13 14:21:01 +01:00
Jens Steube
9d22f77754
Merge pull request #1810 from gituser/master
Create ru.hckmap for Russian Language
2018-12-13 14:20:50 +01:00
Sein Coray
af5d512b6f
Added new hash mode 18500 in usage 2018-12-10 17:02:22 +01:00
Sein Coray
e0c2e4404e
Added new hash mode 18500 to readme 2018-12-10 16:50:58 +01:00
Sein Coray
997a6cce87
Changed cat -A to cat -vet in test.sh 2018-12-10 16:33:56 +01:00
Sein Coray
a70a0513bf
Added hash mode 18500 sha1(md5(md5($pass)))
closes hashcat/hashcat#1652
2018-12-10 16:11:11 +01:00
philsmd
7646509234
fixed validation of the --brain-client-features value 2018-12-10 13:16:41 +01:00
gituser
d59d06e2d7
Create ru.hckmap for Russian Language 2018-12-10 00:04:41 +03:00
Jens Steube
050b54b8cf
Merge pull request #1808 from Naufragous/fix-snprintf
Correct buffer size parameter in snprintf calls
2018-12-09 20:38:57 +01:00
R. Yushaev
074fad9fef Correct buffer size parameter in snprintf calls
There are approx. 240 snprintf calls that set the target buffer size to
out_len - 1 or similar. This "mind the null character" subtraction is
unnecessary since snprintf already includes the string termination into
the given buffer size.
2018-12-07 10:37:56 +01:00
Jens Steube
15ece0902f
Merge pull request #1804 from Naufragous/odf-cracking
Add support for Open Document Format 1.2
2018-12-07 09:36:31 +01:00
Jens Steube
9d213147e8
Merge pull request #1805 from mcovalt/electrum_salt_type_2
Electrum Salt-Type 2
2018-12-07 09:33:13 +01:00
R. Yushaev
6a5b0c821e Add support for Open Document Format 1.2
Contains a kernel for the latest ODF 1.2 encryption implemented in
LibreOffice. The algorithm uses a SHA-256 checksum, a PBKDF2-HMAC-SHA1
key derivation with 100000 iterations and key stretching and AES-CBC
encryption.

Valid hashes can be extracted with the libreoffice2john.py script,
available from the John the Ripper Jumbo repository at
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/libreoffice2john.py

You have to remove the filename suffix at the end of the hash before
passing it to hashcat. Also see 'hashcat -m18400 --example-hashes'.

You can leave the filename prefix if you use the --username option to
process those hashes.

 - Add hash-mode 18400 (Open Document Format (ODF) 1.2 (SHA-256, AES))
 - Tests: add hash-mode 18400 (Open Document Format (ODF) 1.2 (SHA-256, AES))
2018-12-06 18:00:09 +01:00
Matt Covalt
e2ac101526 Update interface.c to remove non-existant Salt-Type 3 support. 2018-12-06 08:33:42 -08:00
Jens Steube
0db69138a7
Merge pull request #1807 from s3inlc/ikepsk
Added changes for fixed output of IKE PSK hashes
2018-12-06 16:25:55 +01:00
Sein Coray
9a872a6775
Added changes for fixed output of IKE PSK hashes 2018-12-06 14:42:17 +01:00
Jens Steube
09ec2a9c3c
Merge pull request #1803 from s3inlc/ikepsk
Extended IKE PSK md5/sha1 (-m 5300/5400) to print hashes correctly
2018-12-05 20:28:12 +01:00
Jens Steube
473b08560b
Merge pull request #1802 from s3inlc/master
Added swiss keyboard layout
2018-12-05 20:25:49 +01:00
Matt Covalt
71d9369a70 Correct Electrum Wallet Salt-Type support 2018-12-05 10:53:14 -08:00
Matt Covalt
bb9328f48b Add salt type 2 support for optimized functions 2018-12-05 10:42:23 -08:00
Matt Covalt
a913db6390 Add salt type 2 support for pure functions 2018-12-05 10:37:40 -08:00
Matt Covalt
36bdcf844a Add function to check if vector represents a Base58 string 2018-12-05 10:20:41 -08:00
Sein Coray
c941e55a35
Extended IKE PSK md5/sha1 (-m 5300/5400) to print hashes correctly 2018-12-05 12:57:54 +01:00
Sein Coray
f96623e1de
Fixed typo with space between characters 2018-12-04 16:05:22 +01:00
Sein Coray
fd8aae131e
Added swiss keyboard layout 2018-12-04 16:03:44 +01:00
Jens Steube
0076f4075b
Merge pull request #1801 from philsmd/noproduction
Set github master to non-production mode
2018-12-04 12:09:05 +01:00
Jens Steube
cb36ea20e8
Merge pull request #1800 from philsmd/master
keyboard layout mapping: added it.hckmap
2018-12-04 12:08:47 +01:00
philsmd
2ee7306322
Set github master to non-production mode 2018-12-04 11:54:05 +01:00
philsmd
d8d5637f0f
added it.hckmap for italian keyboard layout mapping 2018-12-04 11:45:58 +01:00
Jens Steube
57980a70d1 se.hckmap: fix syntax error in space bar 2018-12-04 10:02:52 +01:00
Jens Steube
815a89e0cc se.hckmap: add missing space bar, replace spaces with tab 2018-12-04 09:58:20 +01:00
Jens Steube
798ba27814
Merge pull request #1799 from ZerxXxes/master
Add swedish keyboard layout mapping
2018-12-04 09:54:55 +01:00
Markus Klock
448ecdaa7b Add swedish keyboard layout mapping 2018-12-03 09:22:16 +01:00
Jens Steube
72319875d8 Update version to 5.1.0 2018-12-02 11:58:48 +01:00
Jens Steube
282022406c Merge branch 'master' of https://github.com/hashcat/hashcat 2018-11-30 23:00:00 +01:00
Jens Steube
0b2ffec379 Fixed selection of OpenCL devices (-d) if there's more than 32 OpenCL devices installed 2018-11-30 22:59:43 +01:00
Jens Steube
774b9bb3b6
Merge pull request #1798 from Naufragous/cleanup-n-hardcode
Cleanup VeraCrypt related code
2018-11-29 12:59:56 +01:00
R. Yushaev
5efebb7b48 Cleanup VeraCrypt related code
Remove unnecessary constant variables by hardcoring values instead of
looking up. Precalculate swaps that are known at compile time. Hardcode
hashes_shown offset as zero for all TC / VC kernels.
2018-11-29 12:49:03 +01:00
Jens Steube
01879c6395
Merge pull request #1796 from Naufragous/veracrypt-camellia
Add Camellia support for VeraCrypt kernels
2018-11-29 12:41:56 +01:00
R. Yushaev
baf47d409e Add Camellia support for VeraCrypt kernels
Adds suport for the Japanese cipher Camellia with 256-bit keys as used
by VeraCrypt.

 - Add Camellia header decryption checks to all VeraCrypt kernels
 - Add test containers for remaining cipher combinations
2018-11-28 14:21:14 +01:00
Jens Steube
b457f402c6 Fix output of mapped password in status screen 2018-11-26 12:39:17 +01:00