1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-12-28 17:38:32 +00:00
Commit Graph

2524 Commits

Author SHA1 Message Date
Jens Steube
b5839644a8
Merge pull request #3300 from philsmd/radmin3_fix_pre
radmin3: use hexadecimal instead of .incbin
2022-05-31 13:02:28 +02:00
Jens Steube
4a7337ba46
Merge pull request #3299 from philsmd/radmin3_fix_datalen_comment
radmin 3: update comment about PRECOMP_DATALEN size
2022-05-31 13:01:46 +02:00
philsmd
ff53873791
radmin3: use hexadecimal instead of .incbin 2022-05-30 18:00:06 +02:00
philsmd
c5e5d63c98
radmin 3: update comment about PRECOMP_DATALEN size 2022-05-30 17:07:07 +02:00
philsmd
79aad28519 radmin 3: remove whitespace, add credits to tests 2022-05-30 16:59:30 +02:00
Jens Steube
e0713889a0 Remove optimized kernels for -m 29200 since they are not faster than pure kernels (due to RSA bottleneck) 2022-05-30 16:43:02 +02:00
Jens Steube
907f0996b1
Merge pull request #3295 from piwvvo/master
Added Radmin3
2022-05-29 19:27:19 +02:00
piwvvo
acfd1a0773 fix -a3 2022-05-28 16:14:27 +02:00
piwvvo
b0ceb41e4a added Radmin3 2022-05-28 15:56:29 +02:00
philsmd
c5bf89a4c3
code style fixes for secp256k1 lib 2022-05-28 11:42:53 +02:00
Jens Steube
9b6c316c35
Merge pull request #3288 from tweqx/master
Add BLAKE2b-512($salt.$pass) and BLAKE2b-512($pass.$salt)
2022-05-26 20:11:33 +02:00
tweqx
42c4c1d72f In the a3 610 kernel single function, apply correctly the last two characters of the salt 2022-05-25 22:59:38 +02:00
tweqx
ebcf5bfe20 Partially revert 9ce30defc: apply salt in the a3 610 multi kernel 2022-05-25 20:43:32 +02:00
philsmd
592c3414b0
fix -m 29100 = Flask -a 0 rule problem 2022-05-24 15:27:26 +02:00
Jens Steube
5581665977 Rename -m 29500 to -m 29100 2022-05-23 15:46:24 +02:00
Jens Steube
2e8ba6ba2c Improve cracking performance of -m 29500 by writing directly into hmac buffers 2022-05-22 18:55:56 +02:00
tweqx
9ce30defcb Don't apply the salt in the a3 BLAKE2b($pass.$salt) optimized OpenCL code 2022-05-21 19:32:39 +02:00
tweqx
0a5575cde5 Add BLAKE2b-512($salt.$pass) and BLAKE2b-512($pass.$salt) 2022-05-21 15:09:05 +02:00
Jens Steube
446d82d8ea Fix -m 29500 in -a 1 mode multihash 2022-05-19 17:27:07 +02:00
Tom Stokes
bd890f3a82
CL upload
renamed to 29500
2022-05-17 09:19:15 +01:00
Jens Steube
e703f88f2e Rename -m 9902 to -m 29000 2022-05-09 16:50:11 +02:00
piwvvo
1ecfb8899f Added sha1($salt.sha1($username.':'.$pass, true)) 2022-05-07 02:09:27 +02:00
Tom Dohrmann
864fee3674 fix DES (14000) for more 16 or more passwords 2022-05-03 21:40:41 +02:00
philsmd
209b3960c7
remove extra leading space in inc_ecc_secp256k1.cl 2022-05-02 15:33:04 +02:00
Jens Steube
78a1048670 Fixed false negative on hash-types 8900, 15700, 22700, 27700 and 28200 if using the HIP backend 2022-04-17 11:47:33 +02:00
Jens Steube
2f4003cded Synchronize SCRYPT code for -m 28200 with -m 8900 as source 2022-04-15 20:33:11 +02:00
Jens Steube
8e532e6162 Fix sha512_hmac_init_global_utf16le_swap(); hmac doesn't have password length 2022-03-31 12:58:01 +02:00
Jens Steube
7b24986096 Add important checks for pw_len == -1 to avoid out of boundary read/writes 2022-03-31 11:45:58 +02:00
Jens Steube
753994bfe0 Fixed password reassembling function reporting an incorrect candidate in some cases when the correct candidate has zero length 2022-03-30 20:52:47 +02:00
Jens Steube
ab300310a0 Improve support for enc_len and aad_len in AES_GCM_GHASH to actually allow 32 bit value (before was only 29 bit) 2022-03-17 09:02:11 +01:00
philsmd
1b770fdea7
fix maximum password length in -O -m 10700 = PDF 2022-03-13 12:59:55 +01:00
Jens Steube
e5b64a29d1 Fix the length positioning of the AAD string used by AES GCM. The implementation was not working at all due to this bug, but also this feature is not used in any kernel so far and thus did not pop up. 2022-03-11 15:29:20 +01:00
Jens Steube
14f78d9910 Improve -m 28400 perfomance slightly because we know the password input is always larger than the maximum supported so we can get rid of the E[] expanding function 2022-03-10 13:15:17 +01:00
Jens Steube
2b89c69cc4
Merge pull request #3202 from Greexter/bitwarden-fix
Added parameter for second PBKDF2 iteration count for -m 23400, fixes #3033
2022-03-09 13:15:39 +01:00
Jens Steube
c94a26b382
Merge pull request #3196 from matrix/Amazon_AWS4-HMAC-SHA256
Added hash-mode: Amazon AWS4-HMAC-SHA256
2022-03-07 16:15:05 +01:00
Jakub
2a5ee51530
Merge branch 'master' into bitwarden-fix 2022-03-06 13:41:32 +01:00
Gabriele Gristina
6f45285919 DPAPI masterkey file v2 (context 3) 2022-03-06 00:55:47 +01:00
Gabriele Gristina
d5c545804b Added hash-mode: DPAPI masterkey file v1 (context 3) 2022-03-06 00:50:46 +01:00
Gabriele Gristina
fe96e26eff Prepare for DPAPI masterkey Context 3 2022-03-06 00:47:14 +01:00
Gabriele Gristina
0d282bbfb3 Added hash-mode: Kerberos 5, etype 18, DB 2022-03-05 12:59:38 +01:00
Gabriele Gristina
580afa985d Added hash-mode: Kerberos 5, etype 17, DB 2022-03-05 12:59:14 +01:00
Jens Steube
96715f7c09
Merge pull request #3197 from matrix/13100_format
Added support to use "John the Ripper" hash format with hash-type 13100
2022-03-04 22:37:26 +01:00
Lars Sætaberget
918b4cf7da Added kernel, module and unit-test for hash-mode 28400: bcryptsha512 2022-03-02 12:32:01 +01:00
Gabriele Gristina
7d636eeef9
Merge branch 'master' into 13100_format 2022-03-01 01:59:44 +01:00
Jakub
0147826870
Merge branch 'master' into bitwarden-fix 2022-03-01 00:29:44 +01:00
Jakub Štrom
2d79bc1a22 remove esalt param 2022-03-01 00:25:06 +01:00
Jakub Štrom
5154807c4e Remove esalt param 2022-03-01 00:01:43 +01:00
Jakub Štrom
9b66c01535 Add parameter for second iteration count 2022-02-28 23:16:12 +01:00
Jakub Štrom
74af4eced6 update module version 2022-02-28 21:47:59 +01:00
Jens Steube
95405ddc2a
Merge pull request #3200 from matrix/18200_format
Added support to use 'John the Ripper' hash format with hash-type 18200
2022-02-28 16:50:39 +01:00