1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-27 02:18:21 +00:00
Commit Graph

178 Commits

Author SHA1 Message Date
jsteube
0507d709f0 Enable setting test.pl IS_OPTIMIZED via environment variable 2019-03-08 16:05:17 +01:00
jsteube
420876c85f Fix -m 8100 module_jit_build_options hook 2019-03-02 16:37:01 +01:00
jsteube
4cf1e75871 Add some module specific warnings for ROCM driver in pure kernel mode 2019-03-02 16:31:56 +01:00
jsteube
58390e34b7 Set back default testing configuration to optimized mode 2019-02-27 10:23:32 +01:00
jsteube
5da1e4b872 Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
jsteube
ae360d8dca Make sure in test.pl to output always at least 8 passwords 2019-02-20 14:18:15 +01:00
jsteube
2162e411e9 Ensure that len_min cannot be larger than len_max, which can happend if len_max was forced to reduced in some special conditions 2019-02-20 13:45:02 +01:00
jsteube
cec4aeac10 Enforce a certain number of entries in random selected password and salt length selection buffers in test.pl 2019-02-20 13:37:34 +01:00
jsteube
a1b72fc93a Go back to at least one minimum and maximum of password and salt length 2019-02-20 13:03:21 +01:00
jsteube
7721645758 Not enforcing minimum and maximum password and salt length saves a lot of headache 2019-02-19 17:37:22 +01:00
jsteube
0e9f445030 Add -m 15400 unit test 2019-02-19 14:28:26 +01:00
jsteube
f2e2967eec Fixed more constraints in unit tests 2019-02-16 16:04:37 +01:00
jsteube
44b15049e7 Mode 2400 and 2410 do not have pure kernel 2019-02-16 14:28:19 +01:00
jsteube
9a4426169c Improve test.pl password selection 2019-02-16 12:08:50 +01:00
jsteube
2c47c03e26 the idea of having guaranteed mixed password and salt lengths is not working.
fixed size password (as in DES) will always produce length 8 but only the first would get accepted.
the same logic basically also applies if the range is less than 8.
2019-01-16 20:56:40 +01:00
jsteube
958d89872a Remove old code 2019-01-03 13:41:54 +01:00
jsteube
55ff8fe729 Guarantee to have used the minimum and maximum length of both password and salt to be used at least once 2019-01-03 13:37:15 +01:00
jsteube
620bd693c5 Guarantee output of 8 entries in single mode in test.pl 2019-01-03 13:19:36 +01:00
jsteube
ac0560fd4a Make use of module_constraints more easy and fix some modes 2018-12-29 16:23:29 +01:00
jsteube
9b572d3faa Add remaining updates for test.sh 2018-12-28 20:50:59 +01:00
jsteube
e137794555 Fix random_number() and -m 12 contraints 2018-12-28 12:30:57 +01:00
jsteube
e8029cdc5c Generate more reasonable pw and salt length in test.pl mode single 2018-12-28 11:53:41 +01:00
jsteube
062e539b02 Workaround old salt length problem 2018-12-28 10:56:45 +01:00
jsteube
22da2407e9 Make sure word length in test.pl single mode only increases or stays equal to previous one 2018-12-28 00:09:25 +01:00
jsteube
10a7c5df3d Improve test.pl functionality a bit 2018-12-27 19:54:12 +01:00
jsteube
2afb4e0f36 Fix test.pl single mode if password is '0' 2018-12-27 16:31:36 +01:00
jsteube
7538e82b72 Bring back comparison of hashlist in crackfile 2018-12-27 15:49:18 +01:00
jsteube
97fc147aec Do not try passwords > length 31 in optimized mode, because this works only in -a 3 mode 2018-12-24 14:21:45 +01:00
Jens Steube
5717fcd1a6 Update test_modules and test.pl to respect valid password and salt length ranges per hash mode 2018-12-23 18:15:53 +01:00
jsteube
8bb28837ef Limit single mode to 31 in general as in old test.pl 2018-12-22 21:13:34 +01:00
R. Yushaev
6365672c34 Add module_preprocess_hashlist hook for tests
Some algorithms have ambiguous hashes (e.g. case-insensetive usernames
in Net-NTLMv2 hashes). This optional function allows test modules to
unify the hashlist before the verification process starts.

Also update readme and minor code formatting.
2018-12-22 19:29:24 +01:00
R. Yushaev
9f1749dce3 Add test modules and helper functions
Modularize mode 5600, add random_ helper functions, update readme.
2018-12-21 12:16:11 +01:00
jsteube
73af860f43 Add functionality in test.pl to allow empty hash returns. This is required to enable hash-mode depending password length checks. NTLM supports just 27 characters in optimized mode, but single mode would produce 32, resulting in a non found password 2018-12-21 09:48:51 +01:00
jsteube
c5fb8ab2e8 Fix use of test.pl from test.sh 2018-12-21 09:20:16 +01:00
jsteube
c0e83dc471 Some minor test.pl fixes, added m01000.pm 2018-12-21 09:10:23 +01:00
R. Yushaev
a92ab33ad5 Add modularized test.pl 2018-12-20 19:14:58 +01:00
R. Yushaev
d0478e4481 Rename test.pl to legacy_test.pl 2018-12-20 17:08:11 +01:00
R. Yushaev
b5a7e967c1 Add support for Open Document Format 1.1
Contains a kernel for the ODF 1.1 encryption implemented in OpenOffice.
The algorithm uses a SHA-1 checksum, a PBKDF2-HMAC-SHA1 key derivation
with 1024 iterations and Blowfish-CFB encryption.

Valid hashes can be extracted with the libreoffice2john.py script,
available from the John the Ripper Jumbo repository at
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/libreoffice2john.py

You have to remove the filename suffix at the end of the hash before
passing it to hashcat. Also see 'hashcat -m18600 --example-hashes'.

You can leave the filename prefix if you use the --username option to
process those hashes.

 - Add hash-mode 18600 (Open Document Format (ODF) 1.1 (SHA-1, Blowfish))
 - Tests: add hash-mode 18600 (Open Document Format (ODF) 1.1 (SHA-1, Blowfish))
2018-12-14 13:23:52 +01:00
R. Yushaev
875d6eb516 Fix selftest for hash-mode 18400 2018-12-14 13:09:54 +01:00
Sein Coray
a70a0513bf
Added hash mode 18500 sha1(md5(md5($pass)))
closes hashcat/hashcat#1652
2018-12-10 16:11:11 +01:00
R. Yushaev
6a5b0c821e Add support for Open Document Format 1.2
Contains a kernel for the latest ODF 1.2 encryption implemented in
LibreOffice. The algorithm uses a SHA-256 checksum, a PBKDF2-HMAC-SHA1
key derivation with 100000 iterations and key stretching and AES-CBC
encryption.

Valid hashes can be extracted with the libreoffice2john.py script,
available from the John the Ripper Jumbo repository at
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/libreoffice2john.py

You have to remove the filename suffix at the end of the hash before
passing it to hashcat. Also see 'hashcat -m18400 --example-hashes'.

You can leave the filename prefix if you use the --username option to
process those hashes.

 - Add hash-mode 18400 (Open Document Format (ODF) 1.2 (SHA-256, AES))
 - Tests: add hash-mode 18400 (Open Document Format (ODF) 1.2 (SHA-256, AES))
2018-12-06 18:00:09 +01:00
Jens Steube
1a8c712452 Fix typo in test.pl 2018-11-21 08:54:20 +01:00
Jens Steube
2635331de3 Unify some global handling in test.pl 2018-11-19 09:30:20 +01:00
jsteube
63aae4d670 Fix missing perl modules in install_modules.sh 2018-11-18 20:48:01 +01:00
R. Yushaev
0134f5f018 Clean up test suite scripts
The test scripts have grown to be quite big (over 15000 lines) and
are hard to navigate. There are multiple if branches with over
40 conditional checks chained together. This commit solves some of
those issues.

 - Unite big repetetive if conditions into clean array lookups
 - Move 'install help' commands to a separate shell script
 - Adjust array lookup in test.sh to behave more intuitive
 - Add comments at key points to simplify navigation
 - Code formatting
2018-11-12 13:49:12 +01:00
Jens Steube
a4200ba167 Added hash-mode 18300 (Apple File System)
Fixes https://github.com/hashcat/hashcat/issues/1686
2018-11-12 11:37:01 +01:00
R. Yushaev
47bd838e25 Add VeraCrypt Streebog support
VeraCrypt added the possibility to use Streebog-512 as hashing algorithm
for the key derivation. This commit adds the necessary VeraCrypt kernels
as well as additional HMAC-Streebog kernels.

 - Add hash-mode 13771: VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 512 bit
 - Add hash-mode 13772: VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 1024 bit
 - Add hash-mode 13773: VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 1536 bit
 - Add hash-mode 11750: HMAC-Streebog-256 (key = $pass), big-endian
 - Add hash-mode 11760: HMAC-Streebog-256 (key = $salt), big-endian
 - Add hash-mode 11860: HMAC-Streebog-512 (key = $salt), big-endian
 - Add test suite for hash-modes 11750, 11760 and 11860
 - Improve pure Streebog kernels
2018-11-08 11:46:31 +01:00
Royce Williams
6053f473eb trailing whitespace 2018-11-01 11:17:02 -08:00
R. Yushaev
a8eb611b1c Add HMAC-Streebog-512 (pure kernels)
Implement HMAC based on GOST 34.11-2012 Streebog-512 as well as a test
case for it. Both the PyGOST + hmac python module and the VeraCrypt HMAC
for Streebog-512 were used as references. The kernels expect the digests
to be in big-endian order according to the RFC examples for Streebog.

Fix two bugs from commit 224315dd62.

 - Add hash-mode 11850: HMAC-Streebog-512 (key = $pass), big-endian
 - Add test case for hash-mode 11850
 - Bugfix for a3-pure Streebog kernels (modes 11700 and 11800)
 - Rename a few Streebog constants in interface.h
2018-10-31 14:42:02 +01:00
Arseniy Sharoglazov
ee873da300 Added hash-modes 18200 (Kerberos 5 AS-REP etype 23) 2018-10-30 19:05:44 +03:00