jsteube
e537197184
Add module_build_plain_postprocess()
2019-01-03 15:43:19 +01:00
jsteube
a81a566121
Remove hashcat_ctx requirement in ascii_digest()
2018-12-21 15:58:15 +01:00
jsteube
cfc9772e0e
Add module_hash_decode_zero_hash()
2018-12-20 12:59:56 +01:00
Jens Steube
3aecd150f9
Call module_hash_encode() in ascii_digest()
2018-12-14 15:29:57 +01:00
Jens Steube
222d76f01e
Replace parse_func() with module_hash_decode()
2018-12-14 12:22:13 +01:00
Jens Steube
b457f402c6
Fix output of mapped password in status screen
2018-11-26 12:39:17 +01:00
Jens Steube
fca4f7e8a6
Prepare to use --keyboard-layout-mapping for algorithms other than TC/VC
2018-11-25 18:21:07 +01:00
Jens Steube
ee2854ec2a
Support multi-byte characters for TC/VC keyboard layout mapping tables
2018-11-25 13:31:37 +01:00
Jens Steube
5d5ac1c935
Prepare for on-the-fly keyboard layout substituations required to crack booting TrueCrypt/VeraCrypt volumes
2018-11-15 14:35:51 +01:00
Jens Steube
b19a03aa84
No need to compute brain_session if --brain-client is not set
2018-11-03 13:15:23 +01:00
Jens Steube
d6fe2c7cd4
The hashcat brain
2018-10-28 16:47:13 +01:00
Jens Steube
e2a9409413
Merge pull request #1710 from unix-ninja/master
...
Add support for TOTP (RFC 6238)
2018-10-22 20:49:31 +02:00
unix-ninja
1809794299
Simplify code in check_hash()
2018-10-22 08:02:57 -04:00
jsteube
d96b649751
Add support for -a 1 in -S mode
2018-10-20 18:00:42 +02:00
Jens Steube
8ca4e46f2c
Remove some debugging code
2018-10-20 11:52:27 +02:00
Jens Steube
a4ac370496
Test fix for plain_t in 32 bit mode
2018-10-20 09:46:24 +02:00
unix-ninja
6558253d72
Don't cause memory leaks...
2018-10-19 15:37:02 -04:00
unix-ninja
8b2af6b207
More code style changes
2018-10-19 08:45:44 -04:00
unix-ninja
db4ec8ed2c
Fix formatting to comply with hashcat coding guidelines
2018-10-17 16:34:34 -04:00
unix-ninja
977b560bb4
Add support for TOTP (RFC 6238)
2018-10-16 15:05:14 -04:00
philsmd
2933f3320a
outfile check: performance improvement by using binary instead of linear search
2018-08-31 12:55:05 +02:00
jsteube
88ebca40b8
Added hash-mode 16800 = WPA-PMKID-PBKDF2
...
Added hash-mode 16801 = WPA-PMKID-PMK
Renamed lot's of existing WPA related variables to WPA-EAPOL in order to distinguish them with WPA-PMKID variables
Renamed WPA/WPA2 to WPA-EAPOL-PBKDF2
Renamed WPA/WPA2 PMK to WPA-EAPOL-PMK
2018-07-25 16:46:06 +02:00
jsteube
547025ec47
HCCAPX management: Use advanced hints in message_pair stored by hcxtools about endian bitness of replay counter
...
Fixed missing code section in -m 2500 and -m 2501 to crack corrupted handshakes with a LE endian bitness base
2018-06-15 17:00:41 +02:00
Jens Steube
d656e9c3a4
OpenCL Kernels: Use the kernel local buffer size as additional reference in order to limit the thread-count
2018-02-11 10:56:08 +01:00
jsteube
a7a15df911
OpenCL Kernels: Improve performance preview accuracy in --benchmark, --speed-only and --progress-only mode
2018-02-10 20:44:13 +01:00
jsteube
05a01d3843
fix some datatypes
2018-02-08 19:13:29 +01:00
jsteube
019ed0de6e
Fix double free
2018-01-31 20:24:57 +01:00
jsteube
e2654efaa7
Hash Parser: Fixed a memory leak in shutdown phase
2018-01-31 16:40:48 +01:00
Rosen Penev
1c5915cae3
remove special time handling in hashcat.
...
There's a way to get 64-bit time_t and 64-bit stat in MinGW, so use that.
2017-12-09 16:40:45 -08:00
jsteube
ea795ef5ab
Move out code to check for hashfile or hash on commandline into dedicated function
2017-12-06 16:12:34 +01:00
philsmd
c9b16d76e6
self-tests: always work with copies of the self-test hash
2017-11-28 16:31:04 +01:00
philsmd
425290bf2b
use hc_asprintf () for PR #1451 instead of snprintf ()
2017-11-17 09:50:52 +01:00
philsmd
612a50408c
in case of a parser error we always should include the actual error message even if hash is long
2017-11-16 12:37:31 +01:00
Rosen Penev
353d3c3008
Fix a bunch of cast-qual warnings
2017-11-13 20:46:26 -08:00
Rosen Penev
3ba84f17f1
More clang tidy fixes
2017-11-05 01:52:29 -07:00
jsteube
583849cd23
Fix missing free() for memory allocated with asprintf()
2017-10-04 13:04:58 +02:00
Rosen Penev
4ba19fa7c1
replace more snprintf calls with hc_asprintf.
2017-10-02 22:10:10 -07:00
jsteube
617dbb97ba
Prepare migration -m 15800 into -m 2500
2017-09-18 13:21:00 +02:00
jsteube
5551337cf6
Show advice to use optimized kernels only if there's actually one for this hash-mode
2017-09-16 22:33:04 +02:00
jsteube
3b89153c2d
Fix use of --hex-salt with SALT_TYPE_GENERIC
2017-09-06 22:14:06 +02:00
jsteube
12d95fd22c
Added option --example-hashes to show an example hash for each hash-mode
2017-08-22 11:09:46 +02:00
philsmd
e33e828bc6
replace all time_t/__time64_t with hc_time_t and all related functions
2017-08-16 19:43:41 +02:00
jsteube
e47506c610
Use pure kernel rule engine for --stdout
2017-08-12 12:11:48 +02:00
jsteube
f5ee3db5a6
Update cpu rule engine to support passwords up to length 256
2017-08-11 11:15:43 +02:00
jsteube
03bb234045
Preparation for WPA/WPA2 AES-CMAC: works till PMK
2017-07-20 12:46:18 +02:00
jsteube
8abd7ae9d1
Fix some old GCC compiler warnings
2017-07-06 10:35:25 +02:00
jsteube
fc100a852b
Added hash-mode 2501 = WPA/WPA2 PMK
...
Fixes https://github.com/hashcat/hashcat/issues/1287
Limited hash-mode 2500 to max length 63
Fixes https://github.com/hashcat/hashcat/issues/1286
2017-07-03 16:11:57 +02:00
jsteube
ad242c2f12
Working example of generic salt up to length 256 for mode 2100
2017-06-20 17:17:13 +02:00
jsteube
a673aee037
Very hot commit, continue reading here:
...
This is a test commit using buffers large enough to handle both passwords and salts up to length 256.
It requires changes to the kernel code, which is not included in here.
It also requires some of the host code to be modified. Before we're going to modify kernel code to support the larger lengths I want to be
sure of:
1. Host code modification is ok (no overflows or underflows)
2. Passwords and Salts are printed correctly to status, outfile, show, left, etc.
3. Performance does not change (or only very minimal)
This is not a patch that supports actual cracking both passwords and salts up to length 256, but it can not fail anyway.
If if it does, there's no reason to continue to add support for both passwords and salts up to length 256.
2017-06-17 17:57:30 +02:00
jsteube
d7e66996c9
Add support for self-test modes that use a binary hashfile (wpa, tc, vc, etc)
2017-06-14 14:05:50 +02:00