Your Name
6bc86d06b1
remove debug printfs, added changes.txt
2023-03-07 23:50:49 +01:00
Your Name
45b803988c
25400 working with 32 bytes plaintext check
2023-03-07 23:38:09 +01:00
Your Name
b01f4e5c2e
corrected ASCII plaintext check from >=20 to >=0x20
2023-03-07 21:53:11 +01:00
Gabriele Gristina
b0c6738289
Rename STR() to M2S(), part 2
2022-02-07 13:31:22 +01:00
Jens Steube
be75e4b4ea
Rename STR() to M2S() to avoid future collisions and move from kernel source to command line parameter
2022-02-07 09:57:08 +01:00
Gabriele Gristina
9d36245d51
Kernels: Set the default Address Space Qualifier for any pointer, refactored / updated KERN_ATTR macros and rc4 cipher functions, in order to support Apple Metal runtime
2022-02-04 19:54:00 +01:00
Gabriele Gristina
2e4a136758
Refactored standard kernel includes in order to support Apple Metal runtime, updated backend, test units and status code
2022-01-18 22:52:14 +01:00
Jens Steube
0abdcb1ae5
Rename GID_MAX to GID_CNT to avoid naming conflict with existing macro
2022-01-04 22:57:26 +01:00
Jens Steube
668d2179cd
Kernels: Refactored standard kernel declaration to use a structure holding u32/u64 attributes to reduce the number of attributes
2022-01-04 18:07:18 +01:00
philsmd
5ef522ed8f
whitespace and code style fixes
2021-10-08 17:38:54 +02:00
Your Name
db2e7d1391
m25400 can now recover both a owner-password and user-password (when set) based on a pdf's o-value
...
- added option to add the user-password to the pdf hash as an extra colum
- added pdf test files, both with and without a owner- and user-password
The main todo is to add a recovered user-password to back the hash that's written to the potfile.
Currently I'm printing a recovered password as "(user password=...) after the recovered owner-password.
Similair as the VC PIM is printed. However, this isn't most elegant.
A secondary todo is to verify a recovered user-password based on the u-value,
this could possibly simplify the check whether the recoverd password is a user-password or owner-password.
2021-08-20 10:16:14 +02:00
Jens Steube
8901e657a5
RC4 Kernels: Improved performance by 20%+ for hash-modes Kerberos 5 (etype 23), MS Office (<= 2003) and PDF (<= 1.6) by using new RC4 code
2021-05-31 08:28:13 +02:00
Your Name
4b24e91610
now we can crack the hash direct from pdf2john.pl, no need to alter it ourselves anymore
2021-04-10 00:07:00 +02:00
Your Name
d52f9c2cad
Added attack mode 25400 which cracks a pdf edit password. It's largely duplicate code of 10500. Based on https://hashcat.net/forum/thread-6233.html
2021-04-01 22:20:54 +02:00