Jens Steube
|
b5839644a8
|
Merge pull request #3300 from philsmd/radmin3_fix_pre
radmin3: use hexadecimal instead of .incbin
|
2022-05-31 13:02:28 +02:00 |
|
Jens Steube
|
4a7337ba46
|
Merge pull request #3299 from philsmd/radmin3_fix_datalen_comment
radmin 3: update comment about PRECOMP_DATALEN size
|
2022-05-31 13:01:46 +02:00 |
|
philsmd
|
ff53873791
|
radmin3: use hexadecimal instead of .incbin
|
2022-05-30 18:00:06 +02:00 |
|
philsmd
|
c5e5d63c98
|
radmin 3: update comment about PRECOMP_DATALEN size
|
2022-05-30 17:07:07 +02:00 |
|
philsmd
|
79aad28519
|
radmin 3: remove whitespace, add credits to tests
|
2022-05-30 16:59:30 +02:00 |
|
Jens Steube
|
e0713889a0
|
Remove optimized kernels for -m 29200 since they are not faster than pure kernels (due to RSA bottleneck)
|
2022-05-30 16:43:02 +02:00 |
|
Jens Steube
|
907f0996b1
|
Merge pull request #3295 from piwvvo/master
Added Radmin3
|
2022-05-29 19:27:19 +02:00 |
|
piwvvo
|
acfd1a0773
|
fix -a3
|
2022-05-28 16:14:27 +02:00 |
|
piwvvo
|
b0ceb41e4a
|
added Radmin3
|
2022-05-28 15:56:29 +02:00 |
|
philsmd
|
c5bf89a4c3
|
code style fixes for secp256k1 lib
|
2022-05-28 11:42:53 +02:00 |
|
Jens Steube
|
9b6c316c35
|
Merge pull request #3288 from tweqx/master
Add BLAKE2b-512($salt.$pass) and BLAKE2b-512($pass.$salt)
|
2022-05-26 20:11:33 +02:00 |
|
tweqx
|
42c4c1d72f
|
In the a3 610 kernel single function, apply correctly the last two characters of the salt
|
2022-05-25 22:59:38 +02:00 |
|
tweqx
|
ebcf5bfe20
|
Partially revert 9ce30defc : apply salt in the a3 610 multi kernel
|
2022-05-25 20:43:32 +02:00 |
|
philsmd
|
592c3414b0
|
fix -m 29100 = Flask -a 0 rule problem
|
2022-05-24 15:27:26 +02:00 |
|
Jens Steube
|
5581665977
|
Rename -m 29500 to -m 29100
|
2022-05-23 15:46:24 +02:00 |
|
Jens Steube
|
2e8ba6ba2c
|
Improve cracking performance of -m 29500 by writing directly into hmac buffers
|
2022-05-22 18:55:56 +02:00 |
|
tweqx
|
9ce30defcb
|
Don't apply the salt in the a3 BLAKE2b($pass.$salt) optimized OpenCL code
|
2022-05-21 19:32:39 +02:00 |
|
tweqx
|
0a5575cde5
|
Add BLAKE2b-512($salt.$pass) and BLAKE2b-512($pass.$salt)
|
2022-05-21 15:09:05 +02:00 |
|
Jens Steube
|
446d82d8ea
|
Fix -m 29500 in -a 1 mode multihash
|
2022-05-19 17:27:07 +02:00 |
|
Tom Stokes
|
bd890f3a82
|
CL upload
renamed to 29500
|
2022-05-17 09:19:15 +01:00 |
|
Jens Steube
|
e703f88f2e
|
Rename -m 9902 to -m 29000
|
2022-05-09 16:50:11 +02:00 |
|
piwvvo
|
1ecfb8899f
|
Added sha1($salt.sha1($username.':'.$pass, true))
|
2022-05-07 02:09:27 +02:00 |
|
Tom Dohrmann
|
864fee3674
|
fix DES (14000) for more 16 or more passwords
|
2022-05-03 21:40:41 +02:00 |
|
philsmd
|
209b3960c7
|
remove extra leading space in inc_ecc_secp256k1.cl
|
2022-05-02 15:33:04 +02:00 |
|
Jens Steube
|
78a1048670
|
Fixed false negative on hash-types 8900, 15700, 22700, 27700 and 28200 if using the HIP backend
|
2022-04-17 11:47:33 +02:00 |
|
Jens Steube
|
2f4003cded
|
Synchronize SCRYPT code for -m 28200 with -m 8900 as source
|
2022-04-15 20:33:11 +02:00 |
|
Jens Steube
|
8e532e6162
|
Fix sha512_hmac_init_global_utf16le_swap(); hmac doesn't have password length
|
2022-03-31 12:58:01 +02:00 |
|
Jens Steube
|
7b24986096
|
Add important checks for pw_len == -1 to avoid out of boundary read/writes
|
2022-03-31 11:45:58 +02:00 |
|
Jens Steube
|
753994bfe0
|
Fixed password reassembling function reporting an incorrect candidate in some cases when the correct candidate has zero length
|
2022-03-30 20:52:47 +02:00 |
|
Jens Steube
|
ab300310a0
|
Improve support for enc_len and aad_len in AES_GCM_GHASH to actually allow 32 bit value (before was only 29 bit)
|
2022-03-17 09:02:11 +01:00 |
|
philsmd
|
1b770fdea7
|
fix maximum password length in -O -m 10700 = PDF
|
2022-03-13 12:59:55 +01:00 |
|
Jens Steube
|
e5b64a29d1
|
Fix the length positioning of the AAD string used by AES GCM. The implementation was not working at all due to this bug, but also this feature is not used in any kernel so far and thus did not pop up.
|
2022-03-11 15:29:20 +01:00 |
|
Jens Steube
|
14f78d9910
|
Improve -m 28400 perfomance slightly because we know the password input is always larger than the maximum supported so we can get rid of the E[] expanding function
|
2022-03-10 13:15:17 +01:00 |
|
Jens Steube
|
2b89c69cc4
|
Merge pull request #3202 from Greexter/bitwarden-fix
Added parameter for second PBKDF2 iteration count for -m 23400, fixes #3033
|
2022-03-09 13:15:39 +01:00 |
|
Jens Steube
|
c94a26b382
|
Merge pull request #3196 from matrix/Amazon_AWS4-HMAC-SHA256
Added hash-mode: Amazon AWS4-HMAC-SHA256
|
2022-03-07 16:15:05 +01:00 |
|
Jakub
|
2a5ee51530
|
Merge branch 'master' into bitwarden-fix
|
2022-03-06 13:41:32 +01:00 |
|
Gabriele Gristina
|
6f45285919
|
DPAPI masterkey file v2 (context 3)
|
2022-03-06 00:55:47 +01:00 |
|
Gabriele Gristina
|
d5c545804b
|
Added hash-mode: DPAPI masterkey file v1 (context 3)
|
2022-03-06 00:50:46 +01:00 |
|
Gabriele Gristina
|
fe96e26eff
|
Prepare for DPAPI masterkey Context 3
|
2022-03-06 00:47:14 +01:00 |
|
Gabriele Gristina
|
0d282bbfb3
|
Added hash-mode: Kerberos 5, etype 18, DB
|
2022-03-05 12:59:38 +01:00 |
|
Gabriele Gristina
|
580afa985d
|
Added hash-mode: Kerberos 5, etype 17, DB
|
2022-03-05 12:59:14 +01:00 |
|
Jens Steube
|
96715f7c09
|
Merge pull request #3197 from matrix/13100_format
Added support to use "John the Ripper" hash format with hash-type 13100
|
2022-03-04 22:37:26 +01:00 |
|
Lars Sætaberget
|
918b4cf7da
|
Added kernel, module and unit-test for hash-mode 28400: bcryptsha512
|
2022-03-02 12:32:01 +01:00 |
|
Gabriele Gristina
|
7d636eeef9
|
Merge branch 'master' into 13100_format
|
2022-03-01 01:59:44 +01:00 |
|
Jakub
|
0147826870
|
Merge branch 'master' into bitwarden-fix
|
2022-03-01 00:29:44 +01:00 |
|
Jakub Štrom
|
2d79bc1a22
|
remove esalt param
|
2022-03-01 00:25:06 +01:00 |
|
Jakub Štrom
|
5154807c4e
|
Remove esalt param
|
2022-03-01 00:01:43 +01:00 |
|
Jakub Štrom
|
9b66c01535
|
Add parameter for second iteration count
|
2022-02-28 23:16:12 +01:00 |
|
Jakub Štrom
|
74af4eced6
|
update module version
|
2022-02-28 21:47:59 +01:00 |
|
Jens Steube
|
95405ddc2a
|
Merge pull request #3200 from matrix/18200_format
Added support to use 'John the Ripper' hash format with hash-type 18200
|
2022-02-28 16:50:39 +01:00 |
|