1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-12-28 17:38:32 +00:00
Commit Graph

1381 Commits

Author SHA1 Message Date
jsteube
e455561f77 Add -L support for -m 10800 in combination with -a 3 2017-07-07 12:48:35 +02:00
jsteube
5de48182b4 Fixed max password length limit in mode 10500 2017-07-07 12:33:06 +02:00
jsteube
bedc481390 Added long passwords support for SAP CODVN H (PWDSALTEDHASH) iSSHA-1 2017-07-07 12:14:06 +02:00
jsteube
f4301c9c22 Optimize use of AES128 and AES256 in Office 2007 2017-07-07 11:57:50 +02:00
jsteube
e2bc2a54c8 Optimize use of AES256 in Office 2013 2017-07-07 11:41:12 +02:00
jsteube
99dfdf466d Optimize use of AES128 in Office 2010 2017-07-07 11:35:47 +02:00
jsteube
ced2608326 Optimize Office 2007 and 2010 OpenCL _loop kernel 2017-07-07 10:42:39 +02:00
jsteube
8916de538a Vectorized MS Office 2013 and added support for long passwords 2017-07-07 10:38:05 +02:00
jsteube
51470b2b04 Vectorized MS Office 2010 and added support for long passwords 2017-07-07 10:03:59 +02:00
jsteube
61f39b37d2 Vectorized MS Office 2007 and added support for long passwords 2017-07-07 00:29:05 +02:00
jsteube
17b003b355 Vectorized Lotus Notes/Domino 8 and added support for long passwords 2017-07-06 14:57:28 +02:00
jsteube
df3890b49d Added long passwords support for SCRYPT 2017-07-06 14:27:36 +02:00
jsteube
ccd85f345d Vectorized 1Password, cloudkeychain and added support for long passwords 2017-07-06 14:11:33 +02:00
jsteube
d63e5f259f Remove some old code from -m 7900 2017-07-06 11:04:05 +02:00
jsteube
6cbd2acd24 Added long passwords support for Drupal7 2017-07-06 11:02:43 +02:00
jsteube
819b53eb1d Added long passwords support for sha256crypt $, SHA256 (Unix) 2017-07-05 13:43:14 +02:00
jsteube
7fec4f27d8 Vectorized OSX v10.8+ (PBKDF2-SHA512) and added support for long passwords 2017-07-05 13:01:55 +02:00
jsteube
b323682185 Merge branch 'master' of https://github.com/hashcat/hashcat 2017-07-05 12:54:21 +02:00
jsteube
f8cae33435 Fix some kernel headers 2017-07-05 12:54:15 +02:00
philsmd
03f4e2b3dc minor typo fixed in comment for the new update() functions 2017-07-05 12:16:37 +02:00
jsteube
195e3c744c Vectorized TrueCrypt PBKDF2-HMAC-Whirlpool and added support for long passwords 2017-07-05 10:08:47 +02:00
jsteube
81c9e3eb4f Backport 1024 and 1536 bit kernel for refactored -m 6212 2017-07-05 09:44:46 +02:00
jsteube
5105bc95a7 Add missing -m 6100 pure kernel for -a 3 2017-07-05 09:44:13 +02:00
jsteube
3c2e2c505e Add -L support for -m 6100 in combination with -a 3 2017-07-04 21:47:01 +02:00
jsteube
f2067d6962 Vectorized TrueCrypt PBKDF2-HMAC-RipeMD160 and added support for long passwords 2017-07-04 18:51:02 +02:00
jsteube
55874ec853 Vectorized VeraCrypt PBKDF2-HMAC-SHA256 and added support for long passwords 2017-07-04 15:40:34 +02:00
jsteube
907b065e00 Vectorized TrueCrypt PBKDF2-HMAC-SHA512 and added support for long passwords 2017-07-04 12:19:40 +02:00
jsteube
c9e98e48d3 Added long passwords support for Samsung Android Password/PIN 2017-07-04 11:49:43 +02:00
jsteube
5eb76ccdde Vectorized Password Safe v3 and added support for long passwords 2017-07-04 11:22:48 +02:00
jsteube
fc100a852b Added hash-mode 2501 = WPA/WPA2 PMK
Fixes https://github.com/hashcat/hashcat/issues/1287
Limited hash-mode 2500 to max length 63
Fixes https://github.com/hashcat/hashcat/issues/1286
2017-07-03 16:11:57 +02:00
jsteube
91f7acbde3 Remove more unused functions after refactor of -m 6x00 kernels 2017-07-03 13:20:05 +02:00
jsteube
1dfdefae69 Vectorized LastPass + LastPass sniffed kernel and added support for long passwords 2017-07-03 13:14:55 +02:00
jsteube
c3f0bb77dd Vectorized AIX {ssha1} kernel and added support for long passwords 2017-07-03 13:06:59 +02:00
jsteube
2e78cf1d58 Vectorized 1Password, agilekeychain kernel and added support for long passwords 2017-07-03 13:00:42 +02:00
jsteube
a8a1fe1b4f Vectorized AIX {ssha512} kernel and added support for long passwords 2017-07-03 12:44:03 +02:00
jsteube
bb1341015f Vectorized AIX {ssha256} kernel and added support for long passwords 2017-07-03 12:08:45 +02:00
jsteube
35e1ee6612 Functions append_0x02() no longer required after rewrite of -m 8800 2017-07-03 11:31:05 +02:00
jsteube
ccc9e46508 Vectorized Android FDE <= 4.3 kernel and added support for passwords up to length 256 2017-07-03 11:29:32 +02:00
jsteube
cbeb9c6e0c Remove unused functions from -m 2500 2017-07-03 11:22:50 +02:00
jsteube
d806aab2c3 Remove some unused functions 2017-07-03 11:18:40 +02:00
jsteube
b03382b334 Get rid of old truncate_block() 2017-07-03 11:07:37 +02:00
jsteube
64704f36c2 Add pure kernel for -m 6300 2017-07-03 10:50:27 +02:00
jsteube
34c85a659d Refactor -m 500 and -m 1600 to use new truncate_block() functions 2017-07-03 10:47:04 +02:00
jsteube
a22da36a00 Add different code generators for truncate_block(), add results to inc_common.cl and make use of them in m01800-pure.cl 2017-07-03 10:41:09 +02:00
jsteube
b9b2112b64 Add pure kernel for -m 1800 2017-07-02 23:27:54 +02:00
jsteube
8e1759650b Add -L support for -m 1700 in combination with -a 3 2017-07-02 19:05:38 +02:00
jsteube
58a66cf31d Fix function declaration of switch_buffer_by_offset_8x4_carry_be_S() 2017-07-02 18:39:55 +02:00
jsteube
a009f239d5 Backport generated scalar code to vector code 2017-07-02 18:26:44 +02:00
jsteube
fbfe81a0a1 Replace code in switch_buffer_by_offset_carry_be_S() with code generated with code generators 2017-07-02 18:15:13 +02:00
jsteube
b07b73f525 Add switch_buffer_by_offset_8x4_be_S() to inc_common.cl 2017-07-02 17:36:15 +02:00
jsteube
6feb0a1630 Rename switch_buffer_by_offset_64x1_le_S() to switch_buffer_by_offset_1x64_le_S() 2017-07-02 15:29:04 +02:00
jsteube
2a50c7ba61 Remove debugging line 2017-07-02 15:21:58 +02:00
jsteube
cd5223eb2f Replace code in switch_buffer_by_offset_be_S() with code generated with code generators 2017-07-02 15:18:44 +02:00
jsteube
521ece537c Replace code in switch_buffer_by_offset_64x1_le_S() in amp_a1.cl with generated code from code generators 2017-07-02 15:08:01 +02:00
jsteube
62d695d572 Rename switch_buffer_by_offset_le_S() to switch_buffer_by_offset_64x1_le_S() in amp_a1.cl 2017-07-02 15:05:55 +02:00
jsteube
48ce6cb71d Add append_0x80_8x4_S() and replace code in switch_buffer_by_offset_le_S() with generated code from code generators 2017-07-02 15:05:08 +02:00
jsteube
f5dca399ad Add -L support for -m 1600 2017-07-01 18:40:29 +02:00
jsteube
b0d5995689 Backport changes from inc_hash_md5.cl to inc_hash_md4.cl 2017-07-01 18:09:05 +02:00
Jens Steube
56dc8ae359 Add two functions md5_update_global_utf16le_swap() and md5_update_global_swap() for later use 2017-07-01 15:06:17 +02:00
jsteube
165380c454 Simplify WPA/WPA2 cracking kernel 2017-07-01 14:41:53 +02:00
jsteube
52c1e15f3f Move kernel-code for -L to standalone files with -pure suffix 2017-07-01 13:02:07 +02:00
jsteube
194af74e91 Add support for maximum bcrypt password length 2017-07-01 11:04:59 +02:00
jsteube
7914e075f6 This patch is an example of how to modify a fast -a 3 kernel to support password lengths up to 256 2017-06-30 17:21:30 +02:00
jsteube
cefd2ddb94 Tune AMD unroll settings for AMD-GPU-PRO 17.40 2017-06-29 15:50:46 +02:00
jsteube
f7a8e7c54b Multiple changes:
* Added more preparations to support to crack passwords and salts up to length 256
* Added option --length-limit-disable to disable optimization based on password- and salt-length
* Added option --self-test-disable to disable self-test functionality on startup
2017-06-29 12:19:05 +02:00
jsteube
c918173fcf Get rid of comb_t which can be safely replace with pw_t now 2017-06-25 00:56:25 +02:00
jsteube
045ac7d8e7 Modify amp_a1 to work with password length 256 2017-06-25 00:42:53 +02:00
Jens Steube
c2a770631f Merge pull request #1284 from neheb/master
Fix signed overflow warnings
2017-06-24 10:51:42 +02:00
Rosen Penev
2f3171fd98
Fix signed overflow warnings 2017-06-23 21:44:50 -07:00
jsteube
c59432a760 Add hcstat2 support to enable masks of length up to 256, also adds a filetype header 2017-06-23 12:13:51 +02:00
jsteube
120cf1d1ba Removed some unused functions, added -m 500 kernel with length 256 support but not activated because too slow 2017-06-23 09:24:50 +02:00
jsteube
71d4926afa Converted -m 400 to password length 256 support
Something weird happend here, read on!

I've expected some performance drop because this algorithm is using the password data itself inside the iteration loop.
That is different to PBKDF2, which I've converted in mode 2100 before and which did not show any performance as expected.

So after I've finished converting this kernel and testing everything works using the unit test, I did some benchmarks to see how much the
performance drop is.

On my 750ti, the speed dropped (minimal) from 981kH/s -> 948kH/s, that's mostly because of the SIMD support i had to drop.
If I'd turn off the SIMD support in the original, the drop would be even less, that us 967kH/s -> 948kH/s which is a bit of a more reasable
comparison in case we just want to rate the drop that is actually caused by the code change itself.

The drop was acceptable for me, so I've decided to check on my GTX1080.Now the weird thing: The performance increased from 6619kH/s to
7134kH/s!!

When I gave it a second thought, it turned out that:

1. The GTX1080 is a scalar GPU so it wont suffer from the drop of the SIMD code as the 750ti did
2. There's a change in how the global data (password) is read into the registers, it reads only that amount of data it actually needs by using
the pw_len information
3. I've added a barrier for CLK_GLOBAL_MEM_FENCE as it turned out to increase the performance in the 750ti

Note that this kernel is now branched into password length < 40 and larger.

There's a large drop on performance where SIMD is really important, for example CPU.

We could workaround this issue by sticking to SIMD inside the length < 40 branch, but I don't know yet how this can be done efficiently.
2017-06-22 13:49:15 +02:00
Jens Steube
0787b91327 Merge branch 'master' of https://github.com/hashcat/hashcat 2017-06-22 10:50:20 +02:00
Jens Steube
45b14ebf1c While not required now, it's better to use scalar functions in amplifier kernel in case it get's changed in the future 2017-06-22 10:28:35 +02:00
jsteube
cea78024bf Fix -m 2100 cracking if (password length & 31) == 0 2017-06-21 16:21:12 +02:00
jsteube
ad242c2f12 Working example of generic salt up to length 256 for mode 2100 2017-06-20 17:17:13 +02:00
jsteube
2c92465036 Add HMAC functionality to inc_hash_md4.cl and make DCC2 use it, resulting in support for longer domain names 2017-06-19 16:42:21 +02:00
jsteube
4174f06008 PoC using a length-independant MD4 hash processing in -m 2100 2017-06-18 23:31:40 +02:00
jsteube
a673aee037 Very hot commit, continue reading here:
This is a test commit using buffers large enough to handle both passwords and salts up to length 256.
It requires changes to the kernel code, which is not included in here.
It also requires some of the host code to be modified. Before we're going to modify kernel code to support the larger lengths I want to be
sure of:
1. Host code modification is ok (no overflows or underflows)
2. Passwords and Salts are printed correctly to status, outfile, show, left, etc.
3. Performance does not change (or only very minimal)
This is not a patch that supports actual cracking both passwords and salts up to length 256, but it can not fail anyway.
If if it does, there's no reason to continue to add support for both passwords and salts up to length 256.
2017-06-17 17:57:30 +02:00
jsteube
c9caca2b0c Increase max password length for DCC2 to 32 2017-06-16 19:28:55 +02:00
Jens Steube
bd01228ad5 Get rid of reqd_work_group_size(), no longer needed 2017-06-16 13:33:00 +02:00
jsteube
8a3ed7fe75 Small WPA improvement, do not check the same candidate twice for LE and BE 2017-06-16 11:33:49 +02:00
jsteube
cf57365e7c Check hashes_shown[] whenever calling mark_hash directly.
Not really needed right now (because those algorithms to have a single digest per salt), but this can change in the future
2017-06-16 10:48:10 +02:00
jsteube
4b2d9f0f29 Fix for https://github.com/hashcat/hashcat/issues/1276 2017-06-16 10:26:15 +02:00
jsteube
e9c010115d Fix some spacing 2017-06-16 10:25:36 +02:00
Jens Steube
e87fb31d3f WPA cracking: Improved nonce-error-corrections mode to use a both positive and negative corrections 2017-06-12 09:59:15 +02:00
Jens Steube
7e5b8d3f25 Added hash-mode 15500 = JKS Java Key Store Private Keys (SHA1) 2017-06-09 09:56:06 +02:00
jsteube
b8ad89c529 Rename function and variables containing 'unicode' to 'utf16le' because that's what's meant actually 2017-06-05 12:15:28 +02:00
Royce Williams
3fc185a66b tidy changes.txt and name normalizations 2017-06-04 13:54:41 -08:00
Jens Steube
542f73eb17 Move luks_tmp_t to correct position in inc_types.h 2017-06-04 21:52:35 +02:00
Jens Steube
9a1951d61c synchronize host and opencl types 2017-06-04 21:51:19 +02:00
Jens Steube
ae5fdba20f Add make_unicode and undo_unicode BE version 2017-06-04 21:16:41 +02:00
Jens Steube
b23ab71d5c - Added hash-mode 15600 = Ethereum Wallet, PBKDF2-HMAC-SHA256
- Added hash-mode 15700 = Ethereum Wallet, PBKDF2-SCRYPT
Resolves https://github.com/hashcat/hashcat/issues/1227
Resolves https://github.com/hashcat/hashcat/issues/1228
2017-06-03 23:23:03 +02:00
DoZ10
6ced398c3c Addressed comments and added 15400 to benchmark.c and tab_completion 2017-05-17 07:35:56 -04:00
DoZ10
5683df2e17 Fixed conflicts 2017-05-16 20:36:55 -04:00
DoZ10
8b6120243d Applied performance changes and fixed multi-mode bad implementation 2017-05-16 19:59:46 -04:00
DoZ10
f31f057113 Fixed minor error in offset calculation. 2017-05-15 22:49:44 -04:00
DoZ10
8dfd1bf066 Final. Implemented offset parameter to reach next keystream in kernels. Tested all kernels with scalar and vector modes 2017-05-15 18:34:34 -04:00
DoZ10
cfc3fa64c0 Implemented offset parameter to reach full ks block of 64 bytes 2017-05-15 08:47:40 -04:00
Fist0urs
a78dce94db All remarks treated:
1) done + got rid of all u8 datatypes in shared struct
	2) cf. previous
	3) necessary as this is computed in _init then used in _comp
	4) done
	5) done
	6) done => switch to 16
	7) done
2017-05-14 19:45:35 +02:00
DoZ10
5ab5e6c7b6 Added salt section comment in kernels 2017-05-14 07:17:51 -04:00
DoZ10
9dee1d274d Removed plain_length parameter and copied esalt buffer to salt ofr sorting mechanism. 2017-05-14 07:14:57 -04:00
DoZ10
0d3b5393ef Swapped mode 670 -> 15400 2017-05-14 06:52:14 -04:00
Fist0urs
7ff09c6710 Preparing PR 2017-05-09 20:14:07 +02:00
DoZ10
c50e8bc486 Fixed position parameters. Tested all kernels. Ok. 2017-05-07 14:02:00 -04:00
DoZ10
2fd31ed89f Completed kernel a3 2017-05-06 21:18:15 -04:00
DoZ10
dd1deb8ed3 Completed kernel a1 2017-05-06 21:12:53 -04:00
DoZ10
8511d9f047 Completed kernel a0. 2017-05-06 21:03:14 -04:00
DoZ10
3c67e0054c Implemented Perl test and fixed issues. Now have a working base. 2017-05-06 20:40:10 -04:00
DoZ10
cd9dc989ce Implemented Chacha20 crypto. 2017-05-06 14:24:50 -04:00
Fist0urs
40bbb0023c Merge branch 'master' of https://github.com/hashcat/hashcat into DPAPImk 2017-05-06 17:00:17 +02:00
Fist0urs
d537712f27 Both DPAPImk v1 and v2 work for single hash, still a bug on multi-hash
Remaining this bug + tests.pl before PR
2017-05-06 16:55:36 +02:00
DoZ10
f6cd42352d CPU parsing mostly done. Kernel showing good values. 2017-05-05 09:02:18 -04:00
DoZ10
152f0b5152 Init work on Chacha20 2017-05-04 22:34:52 -04:00
Jens Steube
b924901bb0 Merge pull request #1226 from DoZ10/master
Blake2b raw hash implementation
2017-05-03 16:38:03 +02:00
Fist0urs
29d331ee17 hmac-sha1 + SID almost working, padding problem 2017-05-02 23:56:00 +02:00
DoZ10
dcd8306b6f Fixed naming convention for kernel blake2_t type 2017-05-01 20:12:20 -04:00
DoZ10
ee558c625d Copied esalt buffer into kernel in the outer loop 2017-05-01 17:28:10 -04:00
DoZ10
8aa389b286 Fixed coding style convention for for() loops 2017-05-01 16:47:54 -04:00
Fist0urs
014278ab0e Working:
- MD4/sha1
  - hmac-sha1
  - pbkdf2-hmac-sha1
  - pbkdf2-hmac-sha512
Remaining:
  - handling of long salt (SID)
  - (AES256/DES3) + the end
2017-05-01 22:21:54 +02:00
DoZ10
22b9f80531 Inserted blake2b_sigma into kernel for perf gain. Standardized naming convention to blake2b_transform() 2017-05-01 16:19:20 -04:00
DoZ10
f0f96140b2 Fixed Attack modes 1 & 3 2017-04-30 21:10:54 -04:00
DoZ10
87e0281237 Moved init params in CPU (interface.c). Fixed vector-type problem in kernel a0. 2017-04-30 20:34:01 -04:00
Fist0urs
73d48dcd26 Initial commit, new format DPAPImk, works till hmac-sha1 2017-05-01 00:48:09 +02:00
mhasbini
5734741392 Add support for rule: eX 2017-04-30 16:23:39 +03:00
DoZ10
e71c68e0af Fixed endianness to remove unecessary kernel swaps ops 2017-04-29 22:10:06 -04:00
Jens Steube
0fcf51dee3 Fixed a missing type specifier in a function declaration of the RACF kernel 2017-04-27 17:56:38 +02:00
DoZ10
c1f8204b06 Prepared transform routine 2017-04-27 01:26:23 -04:00
DoZ10
0e018c717d Unrolled for() loops and removed S & P structs 2017-04-26 21:17:29 -04:00
DoZ10
76e3c0618e Fixed for() loops coding style 2017-04-26 16:15:50 -04:00
DoZ10
903e716b9a Swapped to outlen and tested. Okay. Still having problems with VECT_SIZE > 1 2017-04-25 18:28:40 -04:00
DoZ10
58c1f46b19 Merge and conflict resolve. 2017-04-24 21:47:35 -04:00
DoZ10
10629190e3 Now compiles for test.sh -m 600 -a 0 -V1 and -V2, but does not resolve on V2. 2017-04-23 20:32:34 -04:00
DoZ10
de477580a0 Code Cleanup and short doc additions 2017-04-22 21:50:22 -04:00
DoZ10
1386d0eecc Added kernel m00600_a1.cl 2017-04-22 10:44:38 -04:00
DoZ10
bb61408e89 Added kernel m00600_a0 2017-04-22 09:51:39 -04:00
DoZ10
60afdc2a30 Added function m04 in attack mode 3 2017-04-22 08:32:05 -04:00
DoZ10
72724ccba4 Removed rotr64_w() function. 2017-04-21 21:08:54 -04:00
DoZ10
b61d74255b Removed load64() and load64_reverse() functions. 2017-04-21 20:52:34 -04:00
DoZ10
ad305308bb Remove useless loop. 2017-04-20 19:32:54 -04:00
DoZ10
5689892e46 Removed useless spaces. 2017-04-20 19:30:04 -04:00
DoZ10
976f50a56b Code cleanup. 2017-04-20 19:24:28 -04:00
DoZ10
3ce9597685 Renamed load64_inv -> load64_reverse 2017-04-20 19:21:47 -04:00
DoZ10
afdef5ce1c fix: Kernel m00600_a3.cl function s04. 2017-04-19 13:27:28 -04:00
Jens Steube
a93a143d1e Use scalar swap32() version for scalar variable 2017-04-17 17:46:27 +02:00
DoZ10
d455c18d4b saved. 2017-04-16 11:51:59 -04:00
DoZ10
c3b95db072 rm: cleanup files. 2017-04-16 11:33:13 -04:00
DoZ10
d5ca5d59db add: lots of things.... 2017-04-16 10:07:12 -04:00
DoZ10
69dad31a29 fix: changed -m 6200 -> 600 2017-04-13 20:45:48 -04:00
DoZ10
abb0f84985 fix: m number in cl file. 2017-04-13 17:37:17 -04:00
DoZ10
bf45f87d39 random work... 2017-04-13 17:06:48 -04:00
DoZ10
4e9bb8b093 init 2017-04-13 08:38:59 -04:00
jsteube
26949a4fce WPA cracking: Improved nonce-error-corrections mode to fix corrupt nonce generated on Big-Endian devices
WPA cracking: Reduced --nonce-error-corrections default from 16 to 8 to compensate speed drop caused due to Big-Endian fixes
Fixes https://github.com/hashcat/hashcat/issues/1221
2017-04-10 10:11:32 +02:00
jsteube
d1b2fa0b31 Added hash-mode 15100 = Juniper/NetBSD sha1crypt 2017-03-23 16:44:32 +01:00
jsteube
2bc65c2c4d A bit a different _comp kernel iteration for WPA which can have lots of handshakes 2017-03-10 19:54:00 +01:00
jsteube
bea0e52cdb Remove unused variable 2017-03-09 10:17:34 +01:00
jsteube
c04dd5c8b1 WPA cracking: Added support for WPA/WPA2 handshake AP nonce automatic error correction
WPA cracking: Added parameter --nonce-error-corrections to configure range of error correction
2017-03-07 14:41:58 +01:00
jsteube
33a043ec63 Refactored internal use of esalt from sync with number of salts to sync with number of digests
This enables a true N esalts per salt feature which is required for WPA/WPA2 handling
In case we need that for a future algorithm, just make sure to have a unique value in digest in hash parser.
Fixes https://github.com/hashcat/hashcat/issues/1158
2017-03-07 09:44:58 +01:00
jsteube
89f8739dde Fixed overflow in bcrypt kernel in expand_key() function 2017-03-03 15:26:59 +01:00
philsmd
35c1f731b8
osx: some more volatile are required for luks/tc 2017-03-03 10:49:40 +01:00
philsmd
fbb1f92d2b
osx: -m 3200 = bcrypt needs a volatile variable 2017-03-02 22:24:12 +01:00
jsteube
72edd17481 Workaround -m 9100 to run on AMDGPU-Pro 2017-02-28 11:34:20 +01:00
jsteube
a5b8a91d58 Small -m 9100 cleanups 2017-02-28 11:13:57 +01:00
Jens Steube
e82ce9243d Added support for filtering hccapx message pairs using --hccapx-message-pair 2017-02-27 12:09:49 +01:00
Jens Steube
0fc949ef69 Fixed cracking of PeopleSoft Token if salt length + password length is >= 128 byte 2017-02-27 11:06:53 +01:00
jsteube
2ece9742e1 Compress multiple newlines to one 2017-02-26 15:42:56 +01:00
jsteube
d0fa9d059d Remove some unused macros 2017-02-26 15:34:45 +01:00
jsteube
22be61b20d Remove aligned __constant datatypes from OpenCL kernel function declarations 2017-02-26 15:16:36 +01:00
jsteube
6401c58568 Align all the __constant buffers to workaround OpenCL JIT compiler errors in NV drivers 378.x 2017-02-26 15:04:53 +01:00
jsteube
3fb433de60 Remove __constant from OpenCL kernel function declarations 2017-02-26 14:57:26 +01:00
jsteube
ecb851ecda Testwise workaround for -m 9100 on 378.x 2017-02-26 14:49:29 +01:00
jsteube
c094f3b511 Workaround added for NVidia OpenCL runtime: RACF kernel requires EBCDIC lookup to be done on shared memory 2017-02-25 17:36:29 +01:00
Jens Steube
2dd8018915 Fix -m 4520 for salt length exactly 15 2017-02-25 12:53:08 +01:00
jsteube
7aab78fb52 Fix broken SHA512 in LUKS due to union refactoring in tmps variable 2017-02-25 12:19:47 +01:00
jsteube
ba5fb80a38 Refactor kernel declarations for Skip32 to enable OSX using it 2017-02-23 15:18:41 +01:00
Jens Steube
4a3c90dd3c Fixes https://github.com/hashcat/hashcat/issues/1123 2017-02-22 20:53:14 +01:00
jsteube
9b08d4af0f Update hccapx format to version 4 2017-02-21 20:07:18 +01:00
Jens Steube
dd55c1eb66 WPA: Changed format for outfile and potfile from essid:mac1:mac2 to hash:mac_ap:mac_sta:essid
Fixes https://github.com/hashcat/hashcat/issues/1113
2017-02-19 14:45:27 +01:00
jsteube
bbb4c74e85 OpenCL Kernel: Remove "static" keyword from function declarations; Causes older Intel OpenCL runtimes to fail compiling 2017-02-17 10:11:05 +01:00
jsteube
63b7321be2 Fixed WPA/WPA2 cracking in case eapol frame is >= 248 byte 2017-02-13 18:31:15 +01:00
jsteube
366f5133ac Workaround added for AMDGPU-Pro OpenCL runtime: RAR3 kernel require a volatile variable to work correctly 2017-02-13 11:36:16 +01:00
philsmd
227c0be95e
resolves #1018: added -m 3910 = md5(md5($pass).md5($salt)) 2017-02-12 18:12:17 +01:00
jsteube
717da7f4f2 Added support for loading hccapx files 2017-02-06 17:03:42 +01:00
philsmd
c18c2950c9
mv switch_buffer_by_offset_8x4_le_S and switch_buffer_by_offset_8x4_le_VV () into inc_common.cl 2017-02-03 11:32:19 +01:00
philsmd
15a9644f2a
fixes #943: added -m 15000 = FileZilla Server >= 0.9.55 2017-02-03 00:07:31 +01:00
jsteube
c1d88f3234 Fix updated switch_buffer_* functions to run on AMD 2017-02-02 13:11:59 +01:00
philsmd
fe6309caa7
fixes #398: added -m 4110 md5($salt.md5($pass.$salt)) 2017-02-01 19:56:49 +01:00
philsmd
8e689058d0
#398: add -m 4010 = md5($salt.md5($salt.$pass)) 2017-02-01 16:56:14 +01:00
jsteube
16beac5b07 Fix kernel m04520_a3.cl 2017-01-31 12:04:36 +01:00
jsteube
fbae77b976 Fix kernel m04520_a1.cl 2017-01-31 11:54:57 +01:00
jsteube
b886dc3ede Fix kernel m04520_a0.cl 2017-01-31 11:54:20 +01:00
jsteube
e0c3f447da Added hash-mode 4520 = sha1($salt.sha1($pass))
Added hash-mode  4522 = PunBB
OpenCL Kernel: Renumbered hash-mode 7600 to 4521
The mode 4520 is the first to support salt length up to 64
2017-01-31 11:44:58 +01:00
philsmd
96e312ccb6
fixes #537: added -m 7000 = Fortigate (FortiOS) 2017-01-30 21:18:37 +01:00
Jens Steube
3baec81d90 Rewrite -m 13400 to work with SHM_TYPE instead of __local to workaround compiler error on Intel CPU 2017-01-30 13:03:56 +01:00
jsteube
1b8c2a29f1 Added hash-mode 14900 = Skip32 2017-01-29 16:43:08 +01:00
jsteube
dd263c1d20 Optimize luks_tmp_t type size 2017-01-29 10:39:45 +01:00
jsteube
dfba341ac5 Fix some CRLF in OpenCL kernels 2017-01-29 10:32:14 +01:00
jsteube
e0189cb741 Fix some compiler warnings for older compilers 2017-01-29 10:23:34 +01:00
jsteube
7c7e4605d4 Fix -m 13400 include filename changed during LUKS implementation 2017-01-27 20:59:15 +01:00
Jens Steube
07c89833c9 Added hash-mode 14800 = iTunes Backup >= 10.0 2017-01-26 21:16:29 +01:00