jsteube
99dfdf466d
Optimize use of AES128 in Office 2010
2017-07-07 11:35:47 +02:00
jsteube
ced2608326
Optimize Office 2007 and 2010 OpenCL _loop kernel
2017-07-07 10:42:39 +02:00
jsteube
8916de538a
Vectorized MS Office 2013 and added support for long passwords
2017-07-07 10:38:05 +02:00
jsteube
51470b2b04
Vectorized MS Office 2010 and added support for long passwords
2017-07-07 10:03:59 +02:00
jsteube
61f39b37d2
Vectorized MS Office 2007 and added support for long passwords
2017-07-07 00:29:05 +02:00
jsteube
17b003b355
Vectorized Lotus Notes/Domino 8 and added support for long passwords
2017-07-06 14:57:28 +02:00
jsteube
df3890b49d
Added long passwords support for SCRYPT
2017-07-06 14:27:36 +02:00
jsteube
ccd85f345d
Vectorized 1Password, cloudkeychain and added support for long passwords
2017-07-06 14:11:33 +02:00
jsteube
d63e5f259f
Remove some old code from -m 7900
2017-07-06 11:04:05 +02:00
jsteube
6cbd2acd24
Added long passwords support for Drupal7
2017-07-06 11:02:43 +02:00
jsteube
819b53eb1d
Added long passwords support for sha256crypt $, SHA256 (Unix)
2017-07-05 13:43:14 +02:00
jsteube
7fec4f27d8
Vectorized OSX v10.8+ (PBKDF2-SHA512) and added support for long passwords
2017-07-05 13:01:55 +02:00
jsteube
b323682185
Merge branch 'master' of https://github.com/hashcat/hashcat
2017-07-05 12:54:21 +02:00
jsteube
f8cae33435
Fix some kernel headers
2017-07-05 12:54:15 +02:00
philsmd
03f4e2b3dc
minor typo fixed in comment for the new update() functions
2017-07-05 12:16:37 +02:00
jsteube
195e3c744c
Vectorized TrueCrypt PBKDF2-HMAC-Whirlpool and added support for long passwords
2017-07-05 10:08:47 +02:00
jsteube
81c9e3eb4f
Backport 1024 and 1536 bit kernel for refactored -m 6212
2017-07-05 09:44:46 +02:00
jsteube
5105bc95a7
Add missing -m 6100 pure kernel for -a 3
2017-07-05 09:44:13 +02:00
jsteube
3c2e2c505e
Add -L support for -m 6100 in combination with -a 3
2017-07-04 21:47:01 +02:00
jsteube
f2067d6962
Vectorized TrueCrypt PBKDF2-HMAC-RipeMD160 and added support for long passwords
2017-07-04 18:51:02 +02:00
jsteube
55874ec853
Vectorized VeraCrypt PBKDF2-HMAC-SHA256 and added support for long passwords
2017-07-04 15:40:34 +02:00
jsteube
907b065e00
Vectorized TrueCrypt PBKDF2-HMAC-SHA512 and added support for long passwords
2017-07-04 12:19:40 +02:00
jsteube
c9e98e48d3
Added long passwords support for Samsung Android Password/PIN
2017-07-04 11:49:43 +02:00
jsteube
5eb76ccdde
Vectorized Password Safe v3 and added support for long passwords
2017-07-04 11:22:48 +02:00
jsteube
fc100a852b
Added hash-mode 2501 = WPA/WPA2 PMK
...
Fixes https://github.com/hashcat/hashcat/issues/1287
Limited hash-mode 2500 to max length 63
Fixes https://github.com/hashcat/hashcat/issues/1286
2017-07-03 16:11:57 +02:00
jsteube
91f7acbde3
Remove more unused functions after refactor of -m 6x00 kernels
2017-07-03 13:20:05 +02:00
jsteube
1dfdefae69
Vectorized LastPass + LastPass sniffed kernel and added support for long passwords
2017-07-03 13:14:55 +02:00
jsteube
c3f0bb77dd
Vectorized AIX {ssha1} kernel and added support for long passwords
2017-07-03 13:06:59 +02:00
jsteube
2e78cf1d58
Vectorized 1Password, agilekeychain kernel and added support for long passwords
2017-07-03 13:00:42 +02:00
jsteube
a8a1fe1b4f
Vectorized AIX {ssha512} kernel and added support for long passwords
2017-07-03 12:44:03 +02:00
jsteube
bb1341015f
Vectorized AIX {ssha256} kernel and added support for long passwords
2017-07-03 12:08:45 +02:00
jsteube
35e1ee6612
Functions append_0x02() no longer required after rewrite of -m 8800
2017-07-03 11:31:05 +02:00
jsteube
ccc9e46508
Vectorized Android FDE <= 4.3 kernel and added support for passwords up to length 256
2017-07-03 11:29:32 +02:00
jsteube
cbeb9c6e0c
Remove unused functions from -m 2500
2017-07-03 11:22:50 +02:00
jsteube
d806aab2c3
Remove some unused functions
2017-07-03 11:18:40 +02:00
jsteube
b03382b334
Get rid of old truncate_block()
2017-07-03 11:07:37 +02:00
jsteube
64704f36c2
Add pure kernel for -m 6300
2017-07-03 10:50:27 +02:00
jsteube
34c85a659d
Refactor -m 500 and -m 1600 to use new truncate_block() functions
2017-07-03 10:47:04 +02:00
jsteube
a22da36a00
Add different code generators for truncate_block(), add results to inc_common.cl and make use of them in m01800-pure.cl
2017-07-03 10:41:09 +02:00
jsteube
b9b2112b64
Add pure kernel for -m 1800
2017-07-02 23:27:54 +02:00
jsteube
8e1759650b
Add -L support for -m 1700 in combination with -a 3
2017-07-02 19:05:38 +02:00
jsteube
58a66cf31d
Fix function declaration of switch_buffer_by_offset_8x4_carry_be_S()
2017-07-02 18:39:55 +02:00
jsteube
a009f239d5
Backport generated scalar code to vector code
2017-07-02 18:26:44 +02:00
jsteube
fbfe81a0a1
Replace code in switch_buffer_by_offset_carry_be_S() with code generated with code generators
2017-07-02 18:15:13 +02:00
jsteube
b07b73f525
Add switch_buffer_by_offset_8x4_be_S() to inc_common.cl
2017-07-02 17:36:15 +02:00
jsteube
6feb0a1630
Rename switch_buffer_by_offset_64x1_le_S() to switch_buffer_by_offset_1x64_le_S()
2017-07-02 15:29:04 +02:00
jsteube
2a50c7ba61
Remove debugging line
2017-07-02 15:21:58 +02:00
jsteube
cd5223eb2f
Replace code in switch_buffer_by_offset_be_S() with code generated with code generators
2017-07-02 15:18:44 +02:00
jsteube
521ece537c
Replace code in switch_buffer_by_offset_64x1_le_S() in amp_a1.cl with generated code from code generators
2017-07-02 15:08:01 +02:00
jsteube
62d695d572
Rename switch_buffer_by_offset_le_S() to switch_buffer_by_offset_64x1_le_S() in amp_a1.cl
2017-07-02 15:05:55 +02:00
jsteube
48ce6cb71d
Add append_0x80_8x4_S() and replace code in switch_buffer_by_offset_le_S() with generated code from code generators
2017-07-02 15:05:08 +02:00
jsteube
f5dca399ad
Add -L support for -m 1600
2017-07-01 18:40:29 +02:00
jsteube
b0d5995689
Backport changes from inc_hash_md5.cl to inc_hash_md4.cl
2017-07-01 18:09:05 +02:00
Jens Steube
56dc8ae359
Add two functions md5_update_global_utf16le_swap() and md5_update_global_swap() for later use
2017-07-01 15:06:17 +02:00
jsteube
165380c454
Simplify WPA/WPA2 cracking kernel
2017-07-01 14:41:53 +02:00
jsteube
52c1e15f3f
Move kernel-code for -L to standalone files with -pure suffix
2017-07-01 13:02:07 +02:00
jsteube
194af74e91
Add support for maximum bcrypt password length
2017-07-01 11:04:59 +02:00
jsteube
7914e075f6
This patch is an example of how to modify a fast -a 3 kernel to support password lengths up to 256
2017-06-30 17:21:30 +02:00
jsteube
cefd2ddb94
Tune AMD unroll settings for AMD-GPU-PRO 17.40
2017-06-29 15:50:46 +02:00
jsteube
f7a8e7c54b
Multiple changes:
...
* Added more preparations to support to crack passwords and salts up to length 256
* Added option --length-limit-disable to disable optimization based on password- and salt-length
* Added option --self-test-disable to disable self-test functionality on startup
2017-06-29 12:19:05 +02:00
jsteube
c918173fcf
Get rid of comb_t which can be safely replace with pw_t now
2017-06-25 00:56:25 +02:00
jsteube
045ac7d8e7
Modify amp_a1 to work with password length 256
2017-06-25 00:42:53 +02:00
Jens Steube
c2a770631f
Merge pull request #1284 from neheb/master
...
Fix signed overflow warnings
2017-06-24 10:51:42 +02:00
Rosen Penev
2f3171fd98
Fix signed overflow warnings
2017-06-23 21:44:50 -07:00
jsteube
c59432a760
Add hcstat2 support to enable masks of length up to 256, also adds a filetype header
2017-06-23 12:13:51 +02:00
jsteube
120cf1d1ba
Removed some unused functions, added -m 500 kernel with length 256 support but not activated because too slow
2017-06-23 09:24:50 +02:00
jsteube
71d4926afa
Converted -m 400 to password length 256 support
...
Something weird happend here, read on!
I've expected some performance drop because this algorithm is using the password data itself inside the iteration loop.
That is different to PBKDF2, which I've converted in mode 2100 before and which did not show any performance as expected.
So after I've finished converting this kernel and testing everything works using the unit test, I did some benchmarks to see how much the
performance drop is.
On my 750ti, the speed dropped (minimal) from 981kH/s -> 948kH/s, that's mostly because of the SIMD support i had to drop.
If I'd turn off the SIMD support in the original, the drop would be even less, that us 967kH/s -> 948kH/s which is a bit of a more reasable
comparison in case we just want to rate the drop that is actually caused by the code change itself.
The drop was acceptable for me, so I've decided to check on my GTX1080.Now the weird thing: The performance increased from 6619kH/s to
7134kH/s!!
When I gave it a second thought, it turned out that:
1. The GTX1080 is a scalar GPU so it wont suffer from the drop of the SIMD code as the 750ti did
2. There's a change in how the global data (password) is read into the registers, it reads only that amount of data it actually needs by using
the pw_len information
3. I've added a barrier for CLK_GLOBAL_MEM_FENCE as it turned out to increase the performance in the 750ti
Note that this kernel is now branched into password length < 40 and larger.
There's a large drop on performance where SIMD is really important, for example CPU.
We could workaround this issue by sticking to SIMD inside the length < 40 branch, but I don't know yet how this can be done efficiently.
2017-06-22 13:49:15 +02:00
Jens Steube
0787b91327
Merge branch 'master' of https://github.com/hashcat/hashcat
2017-06-22 10:50:20 +02:00
Jens Steube
45b14ebf1c
While not required now, it's better to use scalar functions in amplifier kernel in case it get's changed in the future
2017-06-22 10:28:35 +02:00
jsteube
cea78024bf
Fix -m 2100 cracking if (password length & 31) == 0
2017-06-21 16:21:12 +02:00
jsteube
ad242c2f12
Working example of generic salt up to length 256 for mode 2100
2017-06-20 17:17:13 +02:00
jsteube
2c92465036
Add HMAC functionality to inc_hash_md4.cl and make DCC2 use it, resulting in support for longer domain names
2017-06-19 16:42:21 +02:00
jsteube
4174f06008
PoC using a length-independant MD4 hash processing in -m 2100
2017-06-18 23:31:40 +02:00
jsteube
a673aee037
Very hot commit, continue reading here:
...
This is a test commit using buffers large enough to handle both passwords and salts up to length 256.
It requires changes to the kernel code, which is not included in here.
It also requires some of the host code to be modified. Before we're going to modify kernel code to support the larger lengths I want to be
sure of:
1. Host code modification is ok (no overflows or underflows)
2. Passwords and Salts are printed correctly to status, outfile, show, left, etc.
3. Performance does not change (or only very minimal)
This is not a patch that supports actual cracking both passwords and salts up to length 256, but it can not fail anyway.
If if it does, there's no reason to continue to add support for both passwords and salts up to length 256.
2017-06-17 17:57:30 +02:00
jsteube
c9caca2b0c
Increase max password length for DCC2 to 32
2017-06-16 19:28:55 +02:00
Jens Steube
bd01228ad5
Get rid of reqd_work_group_size(), no longer needed
2017-06-16 13:33:00 +02:00
jsteube
8a3ed7fe75
Small WPA improvement, do not check the same candidate twice for LE and BE
2017-06-16 11:33:49 +02:00
jsteube
cf57365e7c
Check hashes_shown[] whenever calling mark_hash directly.
...
Not really needed right now (because those algorithms to have a single digest per salt), but this can change in the future
2017-06-16 10:48:10 +02:00
jsteube
4b2d9f0f29
Fix for https://github.com/hashcat/hashcat/issues/1276
2017-06-16 10:26:15 +02:00
jsteube
e9c010115d
Fix some spacing
2017-06-16 10:25:36 +02:00
Jens Steube
e87fb31d3f
WPA cracking: Improved nonce-error-corrections mode to use a both positive and negative corrections
2017-06-12 09:59:15 +02:00
Jens Steube
7e5b8d3f25
Added hash-mode 15500 = JKS Java Key Store Private Keys (SHA1)
2017-06-09 09:56:06 +02:00
jsteube
b8ad89c529
Rename function and variables containing 'unicode' to 'utf16le' because that's what's meant actually
2017-06-05 12:15:28 +02:00
Royce Williams
3fc185a66b
tidy changes.txt and name normalizations
2017-06-04 13:54:41 -08:00
Jens Steube
542f73eb17
Move luks_tmp_t to correct position in inc_types.h
2017-06-04 21:52:35 +02:00
Jens Steube
9a1951d61c
synchronize host and opencl types
2017-06-04 21:51:19 +02:00
Jens Steube
ae5fdba20f
Add make_unicode and undo_unicode BE version
2017-06-04 21:16:41 +02:00
Jens Steube
b23ab71d5c
- Added hash-mode 15600 = Ethereum Wallet, PBKDF2-HMAC-SHA256
...
- Added hash-mode 15700 = Ethereum Wallet, PBKDF2-SCRYPT
Resolves https://github.com/hashcat/hashcat/issues/1227
Resolves https://github.com/hashcat/hashcat/issues/1228
2017-06-03 23:23:03 +02:00
DoZ10
6ced398c3c
Addressed comments and added 15400 to benchmark.c and tab_completion
2017-05-17 07:35:56 -04:00
DoZ10
5683df2e17
Fixed conflicts
2017-05-16 20:36:55 -04:00
DoZ10
8b6120243d
Applied performance changes and fixed multi-mode bad implementation
2017-05-16 19:59:46 -04:00
DoZ10
f31f057113
Fixed minor error in offset calculation.
2017-05-15 22:49:44 -04:00
DoZ10
8dfd1bf066
Final. Implemented offset parameter to reach next keystream in kernels. Tested all kernels with scalar and vector modes
2017-05-15 18:34:34 -04:00
DoZ10
cfc3fa64c0
Implemented offset parameter to reach full ks block of 64 bytes
2017-05-15 08:47:40 -04:00
Fist0urs
a78dce94db
All remarks treated:
...
1) done + got rid of all u8 datatypes in shared struct
2) cf. previous
3) necessary as this is computed in _init then used in _comp
4) done
5) done
6) done => switch to 16
7) done
2017-05-14 19:45:35 +02:00
DoZ10
5ab5e6c7b6
Added salt section comment in kernels
2017-05-14 07:17:51 -04:00
DoZ10
9dee1d274d
Removed plain_length parameter and copied esalt buffer to salt ofr sorting mechanism.
2017-05-14 07:14:57 -04:00
DoZ10
0d3b5393ef
Swapped mode 670 -> 15400
2017-05-14 06:52:14 -04:00
Fist0urs
7ff09c6710
Preparing PR
2017-05-09 20:14:07 +02:00
DoZ10
c50e8bc486
Fixed position parameters. Tested all kernels. Ok.
2017-05-07 14:02:00 -04:00
DoZ10
2fd31ed89f
Completed kernel a3
2017-05-06 21:18:15 -04:00
DoZ10
dd1deb8ed3
Completed kernel a1
2017-05-06 21:12:53 -04:00
DoZ10
8511d9f047
Completed kernel a0.
2017-05-06 21:03:14 -04:00
DoZ10
3c67e0054c
Implemented Perl test and fixed issues. Now have a working base.
2017-05-06 20:40:10 -04:00
DoZ10
cd9dc989ce
Implemented Chacha20 crypto.
2017-05-06 14:24:50 -04:00
Fist0urs
40bbb0023c
Merge branch 'master' of https://github.com/hashcat/hashcat into DPAPImk
2017-05-06 17:00:17 +02:00
Fist0urs
d537712f27
Both DPAPImk v1 and v2 work for single hash, still a bug on multi-hash
...
Remaining this bug + tests.pl before PR
2017-05-06 16:55:36 +02:00
DoZ10
f6cd42352d
CPU parsing mostly done. Kernel showing good values.
2017-05-05 09:02:18 -04:00
DoZ10
152f0b5152
Init work on Chacha20
2017-05-04 22:34:52 -04:00
Jens Steube
b924901bb0
Merge pull request #1226 from DoZ10/master
...
Blake2b raw hash implementation
2017-05-03 16:38:03 +02:00
Fist0urs
29d331ee17
hmac-sha1 + SID almost working, padding problem
2017-05-02 23:56:00 +02:00
DoZ10
dcd8306b6f
Fixed naming convention for kernel blake2_t type
2017-05-01 20:12:20 -04:00
DoZ10
ee558c625d
Copied esalt buffer into kernel in the outer loop
2017-05-01 17:28:10 -04:00
DoZ10
8aa389b286
Fixed coding style convention for for() loops
2017-05-01 16:47:54 -04:00
Fist0urs
014278ab0e
Working:
...
- MD4/sha1
- hmac-sha1
- pbkdf2-hmac-sha1
- pbkdf2-hmac-sha512
Remaining:
- handling of long salt (SID)
- (AES256/DES3) + the end
2017-05-01 22:21:54 +02:00
DoZ10
22b9f80531
Inserted blake2b_sigma into kernel for perf gain. Standardized naming convention to blake2b_transform()
2017-05-01 16:19:20 -04:00
DoZ10
f0f96140b2
Fixed Attack modes 1 & 3
2017-04-30 21:10:54 -04:00
DoZ10
87e0281237
Moved init params in CPU (interface.c). Fixed vector-type problem in kernel a0.
2017-04-30 20:34:01 -04:00
Fist0urs
73d48dcd26
Initial commit, new format DPAPImk, works till hmac-sha1
2017-05-01 00:48:09 +02:00
mhasbini
5734741392
Add support for rule: eX
2017-04-30 16:23:39 +03:00
DoZ10
e71c68e0af
Fixed endianness to remove unecessary kernel swaps ops
2017-04-29 22:10:06 -04:00
Jens Steube
0fcf51dee3
Fixed a missing type specifier in a function declaration of the RACF kernel
2017-04-27 17:56:38 +02:00
DoZ10
c1f8204b06
Prepared transform routine
2017-04-27 01:26:23 -04:00
DoZ10
0e018c717d
Unrolled for() loops and removed S & P structs
2017-04-26 21:17:29 -04:00
DoZ10
76e3c0618e
Fixed for() loops coding style
2017-04-26 16:15:50 -04:00
DoZ10
903e716b9a
Swapped to outlen and tested. Okay. Still having problems with VECT_SIZE > 1
2017-04-25 18:28:40 -04:00
DoZ10
58c1f46b19
Merge and conflict resolve.
2017-04-24 21:47:35 -04:00
DoZ10
10629190e3
Now compiles for test.sh -m 600 -a 0 -V1 and -V2, but does not resolve on V2.
2017-04-23 20:32:34 -04:00
DoZ10
de477580a0
Code Cleanup and short doc additions
2017-04-22 21:50:22 -04:00
DoZ10
1386d0eecc
Added kernel m00600_a1.cl
2017-04-22 10:44:38 -04:00
DoZ10
bb61408e89
Added kernel m00600_a0
2017-04-22 09:51:39 -04:00
DoZ10
60afdc2a30
Added function m04 in attack mode 3
2017-04-22 08:32:05 -04:00
DoZ10
72724ccba4
Removed rotr64_w() function.
2017-04-21 21:08:54 -04:00
DoZ10
b61d74255b
Removed load64() and load64_reverse() functions.
2017-04-21 20:52:34 -04:00
DoZ10
ad305308bb
Remove useless loop.
2017-04-20 19:32:54 -04:00
DoZ10
5689892e46
Removed useless spaces.
2017-04-20 19:30:04 -04:00
DoZ10
976f50a56b
Code cleanup.
2017-04-20 19:24:28 -04:00
DoZ10
3ce9597685
Renamed load64_inv -> load64_reverse
2017-04-20 19:21:47 -04:00
DoZ10
afdef5ce1c
fix: Kernel m00600_a3.cl function s04.
2017-04-19 13:27:28 -04:00
Jens Steube
a93a143d1e
Use scalar swap32() version for scalar variable
2017-04-17 17:46:27 +02:00
DoZ10
d455c18d4b
saved.
2017-04-16 11:51:59 -04:00
DoZ10
c3b95db072
rm: cleanup files.
2017-04-16 11:33:13 -04:00
DoZ10
d5ca5d59db
add: lots of things....
2017-04-16 10:07:12 -04:00
DoZ10
69dad31a29
fix: changed -m 6200 -> 600
2017-04-13 20:45:48 -04:00
DoZ10
abb0f84985
fix: m number in cl file.
2017-04-13 17:37:17 -04:00
DoZ10
bf45f87d39
random work...
2017-04-13 17:06:48 -04:00
DoZ10
4e9bb8b093
init
2017-04-13 08:38:59 -04:00
jsteube
26949a4fce
WPA cracking: Improved nonce-error-corrections mode to fix corrupt nonce generated on Big-Endian devices
...
WPA cracking: Reduced --nonce-error-corrections default from 16 to 8 to compensate speed drop caused due to Big-Endian fixes
Fixes https://github.com/hashcat/hashcat/issues/1221
2017-04-10 10:11:32 +02:00
jsteube
d1b2fa0b31
Added hash-mode 15100 = Juniper/NetBSD sha1crypt
2017-03-23 16:44:32 +01:00
jsteube
2bc65c2c4d
A bit a different _comp kernel iteration for WPA which can have lots of handshakes
2017-03-10 19:54:00 +01:00