1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-15 20:39:17 +00:00
Commit Graph

5 Commits

Author SHA1 Message Date
philsmd
5ef522ed8f
whitespace and code style fixes 2021-10-08 17:38:54 +02:00
Your Name
db2e7d1391 m25400 can now recover both a owner-password and user-password (when set) based on a pdf's o-value
- added option to add the user-password to the pdf hash as an extra colum
- added pdf test files, both with and without a owner- and user-password

The main todo is to add a recovered user-password to back the hash that's written to the potfile.
Currently I'm printing a recovered password as "(user password=...) after the recovered owner-password.
Similair as the VC PIM is printed. However, this isn't most elegant.

A secondary todo is to verify a recovered user-password based on the u-value,
this could possibly simplify the check whether the recoverd password is a user-password or owner-password.
2021-08-20 10:16:14 +02:00
Jens Steube
8901e657a5 RC4 Kernels: Improved performance by 20%+ for hash-modes Kerberos 5 (etype 23), MS Office (<= 2003) and PDF (<= 1.6) by using new RC4 code 2021-05-31 08:28:13 +02:00
Your Name
4b24e91610 now we can crack the hash direct from pdf2john.pl, no need to alter it ourselves anymore 2021-04-10 00:07:00 +02:00
Your Name
d52f9c2cad Added attack mode 25400 which cracks a pdf edit password. It's largely duplicate code of 10500. Based on https://hashcat.net/forum/thread-6233.html 2021-04-01 22:20:54 +02:00