Arseniy Sharoglazov
ee873da300
Added hash-modes 18200 (Kerberos 5 AS-REP etype 23)
6 years ago
Jens Steube
b0077860c7
Workaround some padding issues with host compiler and OpenCL JiT on 32 and 64 bit systems
6 years ago
Jens Steube
a4ac370496
Test fix for plain_t in 32 bit mode
6 years ago
Jens Steube
0a74f058ac
Synchronize salt_t datatypes in types.h and inc_types.cl
6 years ago
Michael Sprecher
1892b842d7
Increased the maximum size of edata2 in Kerberos 5 TGS-REP etype 23
6 years ago
Michael Sprecher
5536ab9917
Getting rid of OPTS_TYPE_HASH_COPY for Ansible Vault
6 years ago
jsteube
103fdf04a1
Fixed a invalid scalar datatype return value in hc_bytealign() where it should be a vector datatype return value
6 years ago
Michael Sprecher
3a321c8dce
Added hash-mode 16900 = Ansible Vault
6 years ago
jsteube
88ebca40b8
Added hash-mode 16800 = WPA-PMKID-PBKDF2
...
Added hash-mode 16801 = WPA-PMKID-PMK
Renamed lot's of existing WPA related variables to WPA-EAPOL in order to distinguish them with WPA-PMKID variables
Renamed WPA/WPA2 to WPA-EAPOL-PBKDF2
Renamed WPA/WPA2 PMK to WPA-EAPOL-PMK
6 years ago
philsmd
2e1845ec11
fixes #1624 : increase esalt/nonce buffer to 1024 for -m 11400 = SIP
6 years ago
Jens Steube
a43d3ad176
Rename some hashcat specific OpenCL functions to avoid conflicts with existing OpenCL functions from OpenCL runtime
6 years ago
Jens Steube
0ab7ab9cec
OpenCL kernels: Removed the use of 'volatile' in inline assembly instructions where it is not needed
6 years ago
jsteube
547025ec47
HCCAPX management: Use advanced hints in message_pair stored by hcxtools about endian bitness of replay counter
...
Fixed missing code section in -m 2500 and -m 2501 to crack corrupted handshakes with a LE endian bitness base
6 years ago
jsteube
05a01d3843
fix some datatypes
7 years ago
jsteube
3e08750900
OpenCL Kernels: Add general function declaration keyword (static inline)
7 years ago
jsteube
a3a16f676f
OpenCL Kernels: Add a decompressing kernel and a compressing host code in order to reduce PCIe transfer time
...
For details see https://hashcat.net/forum/thread-7267.html
7 years ago
jsteube
553668bb9f
Added hash-mode 16600 = Electrum Wallet (Salt-Type 1-3)
7 years ago
jsteube
ee9ec0f9a7
Add JWT esalt datatype
7 years ago
philsmd
bf656774bb
fixes #1279 : added -m 16300 = Ethereum Pre-Sale Wallet, PBKDF2-HMAC-SHA256
7 years ago
jsteube
0d89ddfcd9
Finish adding hash-mode 16200 = Apple Secure Notes
7 years ago
jsteube
5847067c96
First working -m 16100 kernel
7 years ago
jsteube
503f676cb0
Remove static keywords from OpenCL functions, they can cause old NV JiT compiler to fail
7 years ago
jsteube
7c2dadab17
no volatile required here
7 years ago
Fist0urs
e3cb3e9b4c
test.pl ready and 0 error. Ready for PR
7 years ago
Fist0urs
a6294537fd
Splitted DPAPI kernel in 2 to increase performances
7 years ago
jsteube
617dbb97ba
Prepare migration -m 15800 into -m 2500
7 years ago
jsteube
ac9f1da747
Add fine-tuned AMD GCN control macros
7 years ago
jsteube
6db2f4cc18
Fix typo
7 years ago
jsteube
918578bee1
Improve some NVidia specific inline assembly
7 years ago
jsteube
9de1e557bb
More VEGA specific inline assembly to improve SHA1 based kernels
7 years ago
jsteube
00e38cc2c6
Add VEGA specific inline assembly to improve all MD4, MD5, SHA1 and SHA256 based kernels
7 years ago
jsteube
1d04de3a8e
Limit kernel-loops in straight-mode to 256, therefore allow rules to be stored in constant memory
7 years ago
jsteube
51372438fe
Allow OpenCL kernel inline assembly if ROCm drivers was detected
7 years ago
jsteube
967e96728d
Make all the OpenCL kernel function includes static
7 years ago
jsteube
21e9c63d46
Fix rotl64() the same was as rotr64()
7 years ago
jsteube
58012ada0c
Fall back to old rotr64 optimization for AMD
7 years ago
jsteube
4f72c8bee6
Add pure kernels for SIP digest authentication (MD5)
7 years ago
jsteube
9562d07264
Replace bitwise swaps with rotate() versions for AMD
7 years ago
jsteube
c255a967df
Fix some types in rotate functions
7 years ago
jsteube
5e34ec348e
Optimize kernels for ROCm 1.6
...
- Remove inline keywords
- Remove volatile keywords where it causes ROCm to slow down
- Replace DES functions (looks like bitselect somehow is no longer mapped to BFI_INT)
7 years ago
jsteube
03bb234045
Preparation for WPA/WPA2 AES-CMAC: works till PMK
7 years ago
jsteube
8a6e3a5275
Add support in HMAC for passwords larger than block size of the underlaying hash
7 years ago
jsteube
af46a1560b
Vectorized Blockchain, My Wallet and added support for long passwords
7 years ago
jsteube
d3e6ae42f0
Added long passwords support for 7-Zip
7 years ago
jsteube
819b53eb1d
Added long passwords support for sha256crypt $, SHA256 (Unix)
7 years ago
jsteube
907b065e00
Vectorized TrueCrypt PBKDF2-HMAC-SHA512 and added support for long passwords
7 years ago
jsteube
fc100a852b
Added hash-mode 2501 = WPA/WPA2 PMK
...
Fixes https://github.com/hashcat/hashcat/issues/1287
Limited hash-mode 2500 to max length 63
Fixes https://github.com/hashcat/hashcat/issues/1286
7 years ago
jsteube
b9b2112b64
Add pure kernel for -m 1800
7 years ago
jsteube
c918173fcf
Get rid of comb_t which can be safely replace with pw_t now
7 years ago
jsteube
a673aee037
Very hot commit, continue reading here:
...
This is a test commit using buffers large enough to handle both passwords and salts up to length 256.
It requires changes to the kernel code, which is not included in here.
It also requires some of the host code to be modified. Before we're going to modify kernel code to support the larger lengths I want to be
sure of:
1. Host code modification is ok (no overflows or underflows)
2. Passwords and Salts are printed correctly to status, outfile, show, left, etc.
3. Performance does not change (or only very minimal)
This is not a patch that supports actual cracking both passwords and salts up to length 256, but it can not fail anyway.
If if it does, there's no reason to continue to add support for both passwords and salts up to length 256.
7 years ago