DoZ10
f56ffdc32f
Removed OPTS_TYPE_ST_ADDBITS15
2017-04-20 19:17:36 -04:00
DoZ10
3cc681989c
fix: changed salt configuration.
2017-04-20 19:09:03 -04:00
DoZ10
afdef5ce1c
fix: Kernel m00600_a3.cl function s04.
2017-04-19 13:27:28 -04:00
DoZ10
c2af1e7c5c
undo: debug
2017-04-16 11:55:21 -04:00
DoZ10
c0cedbf15f
add: now target hash is okay.
2017-04-16 11:28:06 -04:00
DoZ10
d5ca5d59db
add: lots of things....
2017-04-16 10:07:12 -04:00
DoZ10
69dad31a29
fix: changed -m 6200 -> 600
2017-04-13 20:45:48 -04:00
DoZ10
25e061ce1c
fix: syntax bug..
2017-04-13 20:26:21 -04:00
DoZ10
0a8f17c24a
fix: g madness...
2017-04-13 17:33:08 -04:00
DoZ10
bf45f87d39
random work...
2017-04-13 17:06:48 -04:00
DoZ10
4e9bb8b093
init
2017-04-13 08:38:59 -04:00
sgroat
21efc80975
fix string
2017-04-10 13:35:01 -07:00
Royce Williams
b668aa2a81
label for 5700 Cisco type 4; update readme.txt
2017-04-04 05:14:08 -08:00
Royce Williams
4a393cacf6
5800 is Samsung only
2017-04-04 05:03:01 -08:00
Royce Williams
8620e4113f
a few minor hash-mode name fixes
2017-04-03 06:55:35 -08:00
Royce Williams
46b83926fa
clarify and standardize hash-mode names
2017-04-03 00:16:56 -08:00
Royce Williams
067372f5ce
more event_log_* standardization
2017-04-01 23:50:06 -08:00
jsteube
d1b2fa0b31
Added hash-mode 15100 = Juniper/NetBSD sha1crypt
2017-03-23 16:44:32 +01:00
philsmd
d60d6f9625
fix for previous commit: make sure that we do not override the hccapx structure values
2017-03-22 12:53:50 +01:00
philsmd
07c748e136
fixes #1199 : introduce special bit (8) in message_pair (HCCAPX) to indicate if replay counter match
2017-03-22 12:09:15 +01:00
jsteube
a30a9f5b45
Fixed a hash validation error when trying to load Android FDE < 4.3 hashes
2017-03-21 14:07:16 +01:00
jsteube
c04dd5c8b1
WPA cracking: Added support for WPA/WPA2 handshake AP nonce automatic error correction
...
WPA cracking: Added parameter --nonce-error-corrections to configure range of error correction
2017-03-07 14:41:58 +01:00
jsteube
33a043ec63
Refactored internal use of esalt from sync with number of salts to sync with number of digests
...
This enables a true N esalts per salt feature which is required for WPA/WPA2 handling
In case we need that for a future algorithm, just make sure to have a unique value in digest in hash parser.
Fixes https://github.com/hashcat/hashcat/issues/1158
2017-03-07 09:44:58 +01:00
philsmd
a2708e1063
fixes #1160 : parsing/displaying -m 7000 = Fortigate hashes
2017-03-05 17:14:55 +01:00
philsmd
522c047860
min pass length init: typo fixed
2017-03-04 20:02:47 +01:00
philsmd
22d1129818
added -m 12001 = Atlassian (PBKDF2-HMAC-SHA1) #611
2017-02-28 14:22:03 +01:00
jsteube
c47f9d4b3e
Fix a bug in wpa_essid_reuse_next() destroying reuse PBKDF2 intermediate keys if duplicate essid logic
2017-02-28 10:20:46 +01:00
Jens Steube
e82ce9243d
Added support for filtering hccapx message pairs using --hccapx-message-pair
2017-02-27 12:09:49 +01:00
Jens Steube
0fc949ef69
Fixed cracking of PeopleSoft Token if salt length + password length is >= 128 byte
2017-02-27 11:06:53 +01:00
jsteube
d2e95d5e1b
Fix WPA/WPA2 incorrectly reports cracked passwords in some cases
2017-02-27 09:30:02 +01:00
jsteube
dc170907ed
Compress multiple newlines to one in host code, too
2017-02-26 15:48:14 +01:00
jsteube
f381b107a3
Remove some unused variable
2017-02-23 12:15:19 +01:00
jsteube
7797826c8d
Continue with WPA hashing logic as it was already
2017-02-23 09:46:26 +01:00
jsteube
d8e056d59f
Also add WPA keymic to parser hash
2017-02-23 00:49:12 +01:00
jsteube
9b08d4af0f
Update hccapx format to version 4
2017-02-21 20:07:18 +01:00
Jens Steube
2dd027af65
Make sure to zero scratch buffer for WPA/WPA2 and LUKS
2017-02-21 13:09:00 +01:00
Jens Steube
dd55c1eb66
WPA: Changed format for outfile and potfile from essid:mac1:mac2 to hash:mac_ap:mac_sta:essid
...
Fixes https://github.com/hashcat/hashcat/issues/1113
2017-02-19 14:45:27 +01:00
jsteube
ef004e85f0
Fix some variable initializationg warnings in older GCC
2017-02-16 10:10:38 +01:00
philsmd
12517f1b7a
typo: don't add URI_prefix_len and URI_suffix_len twice
2017-02-15 11:50:35 +01:00
philsmd
02480f906a
prevent buffer overflow in case of OPTS_TYPE_ST_ADD80 and/or OPTS_TYPE_ST_ADD01
2017-02-15 11:33:52 +01:00
philsmd
0993f2e748
fixed maximum salt_len for pbkdf2 buffers
2017-02-14 22:05:47 +01:00
philsmd
54915e4d7b
minor: do not use UINT_MAX as upper bound for the salt_len
2017-02-14 21:54:49 +01:00
philsmd
f351461ecd
max esalt_buf for sip fixed: we also need to append 0x80
2017-02-14 21:45:18 +01:00
jsteube
be3ce44f75
Fix CID 1402444 ( #1 of 1): Out-of-bounds read
2017-02-14 21:40:11 +01:00
philsmd
f535eb2bd0
always check the input for NULL before the strtok_r () calls
2017-02-14 20:46:03 +01:00
philsmd
12047861c5
also double-check input/output of strtok_r ()
2017-02-14 20:07:49 +01:00
philsmd
a82f6fb77c
our usage of strtok_r () was not totally correct (but almost)
2017-02-14 19:48:07 +01:00
philsmd
e5ecbb9a59
minor: within parse_and_store_salt () do the initialization of the buffer at the very start
2017-02-14 19:30:36 +01:00
philsmd
05f8abdbe7
minor: useless code (since we removed the swaps)
2017-02-14 19:17:45 +01:00
philsmd
7818712090
minor: check for return value of sscanf () within the zip2 parse function
2017-02-14 18:58:25 +01:00