Commit Graph

10 Commits (540c0dde81b0524376f89af20b7c4f137147fc44)

Author SHA1 Message Date
Jens Steube 540c0dde81
Merge pull request #2877 from thatux/25400_salt
3 years ago
Your Name db2e7d1391 m25400 can now recover both a owner-password and user-password (when set) based on a pdf's o-value
3 years ago
Jens Steube 01738fafa0 Deprecated Plugins: Add new module function module_deprecated_notice() to mark a plugin as deprecated and to return a free text user notice
3 years ago
Jens Steube 20a7b9f992 Tuning-Database: Add new module function module_extra_tuningdb_block() to extend hashcat.hctune content from a plugin
3 years ago
Jens Steube 44dbedd21a Use improved native threads derivation for RC4 based hash-modes
3 years ago
Jens Steube 7faf6859d6 Backport hand-optimized compiler settings in modules from ROCM to HIP
3 years ago
Your Name b24ca10087 pdf edit password m25400 can now also use the user-password as salt
3 years ago
Jens Steube 8901e657a5 RC4 Kernels: Improved performance by 20%+ for hash-modes Kerberos 5 (etype 23), MS Office (<= 2003) and PDF (<= 1.6) by using new RC4 code
3 years ago
Your Name 4b24e91610 now we can crack the hash direct from pdf2john.pl, no need to alter it ourselves anymore
3 years ago
Your Name d52f9c2cad Added attack mode 25400 which cracks a pdf edit password. It's largely duplicate code of 10500. Based on https://hashcat.net/forum/thread-6233.html
3 years ago