jsteube
8f38bb9172
Add some missing notes on bugfixes to changes.txt
2019-02-26 21:53:29 +01:00
jsteube
5da1e4b872
Fixed maximum password length limit which was announced as 256 but actually was 255
2019-02-26 21:20:07 +01:00
jsteube
2c0c82c8af
OpenCL Runtime: Workaround JiT compiler error on AMDGPU driver compiling WPA-EAPOL-PBKDF2 OpenCL kernel
2019-02-24 09:10:37 +01:00
jsteube
761475b224
OpenCL Runtime: Improve ROCM detection and make sure to not confuse with recent AMDGPU drivers
2019-02-23 22:50:19 +01:00
jsteube
9b916918de
Remove some debugging leftovers in unit tests
2019-02-23 17:50:21 +01:00
Jens Steube
306d40a13a
Fixed incorrect progress-only result in a special race condition
2019-02-23 12:24:32 +01:00
jsteube
11b1189e53
Fix makefile targets
2019-02-22 21:58:33 +01:00
jsteube
68d6d36761
Binary Distribution: Removed 32 bit binary executeables
2019-02-22 21:36:02 +01:00
jsteube
1769181d08
Some extra steps for -m 18900
2019-02-22 15:50:03 +01:00
jsteube
b4d52e412b
Rename -m 18700 to Java Object hashCode()
2019-02-22 09:30:56 +01:00
jsteube
5b35c5c1e6
Tuning Database: Updated hashcat.hctune with new models and refreshed vector width values
2019-02-21 17:15:09 +01:00
jsteube
51eb9ebff7
Added hash-mode 18700 DJB 32
2019-02-21 13:52:01 +01:00
jsteube
9fc193ce47
Bitcoin Wallet: Be more user friendly by allowing a larger data range for ckey and public_key
2019-02-20 16:20:28 +01:00
philsmd
7b3ab9dbcb
fixes 7-Zip parser limits for encrypted/decrypted data lengths
2019-02-15 18:49:16 +01:00
jsteube
158b93832c
Fixed cracking of Cisco-PIX and Cisco-ASA MD5 passwords in mask-attack mode if mask > length 16
2019-02-15 15:50:58 +01:00
R. Yushaev
b5a7e967c1
Add support for Open Document Format 1.1
...
Contains a kernel for the ODF 1.1 encryption implemented in OpenOffice.
The algorithm uses a SHA-1 checksum, a PBKDF2-HMAC-SHA1 key derivation
with 1024 iterations and Blowfish-CFB encryption.
Valid hashes can be extracted with the libreoffice2john.py script,
available from the John the Ripper Jumbo repository at
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/libreoffice2john.py
You have to remove the filename suffix at the end of the hash before
passing it to hashcat. Also see 'hashcat -m18600 --example-hashes'.
You can leave the filename prefix if you use the --username option to
process those hashes.
- Add hash-mode 18600 (Open Document Format (ODF) 1.1 (SHA-1, Blowfish))
- Tests: add hash-mode 18600 (Open Document Format (ODF) 1.1 (SHA-1, Blowfish))
2018-12-14 13:23:52 +01:00
Jens Steube
376baa2b10
Merge pull request #1814 from s3inlc/algorithm/1652
...
Added hash mode 18500 sha1(md5(md5($pass)))
2018-12-13 14:21:22 +01:00
Sein Coray
a70a0513bf
Added hash mode 18500 sha1(md5(md5($pass)))
...
closes hashcat/hashcat#1652
2018-12-10 16:11:11 +01:00
philsmd
7646509234
fixed validation of the --brain-client-features value
2018-12-10 13:16:41 +01:00
Jens Steube
15ece0902f
Merge pull request #1804 from Naufragous/odf-cracking
...
Add support for Open Document Format 1.2
2018-12-07 09:36:31 +01:00
Jens Steube
9d213147e8
Merge pull request #1805 from mcovalt/electrum_salt_type_2
...
Electrum Salt-Type 2
2018-12-07 09:33:13 +01:00
R. Yushaev
6a5b0c821e
Add support for Open Document Format 1.2
...
Contains a kernel for the latest ODF 1.2 encryption implemented in
LibreOffice. The algorithm uses a SHA-256 checksum, a PBKDF2-HMAC-SHA1
key derivation with 100000 iterations and key stretching and AES-CBC
encryption.
Valid hashes can be extracted with the libreoffice2john.py script,
available from the John the Ripper Jumbo repository at
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/libreoffice2john.py
You have to remove the filename suffix at the end of the hash before
passing it to hashcat. Also see 'hashcat -m18400 --example-hashes'.
You can leave the filename prefix if you use the --username option to
process those hashes.
- Add hash-mode 18400 (Open Document Format (ODF) 1.2 (SHA-256, AES))
- Tests: add hash-mode 18400 (Open Document Format (ODF) 1.2 (SHA-256, AES))
2018-12-06 18:00:09 +01:00
Sein Coray
9a872a6775
Added changes for fixed output of IKE PSK hashes
2018-12-06 14:42:17 +01:00
Matt Covalt
71d9369a70
Correct Electrum Wallet Salt-Type support
2018-12-05 10:53:14 -08:00
philsmd
2ee7306322
Set github master to non-production mode
2018-12-04 11:54:05 +01:00
Jens Steube
0b2ffec379
Fixed selection of OpenCL devices (-d) if there's more than 32 OpenCL devices installed
2018-11-30 22:59:43 +01:00
R. Yushaev
baf47d409e
Add Camellia support for VeraCrypt kernels
...
Adds suport for the Japanese cipher Camellia with 256-bit keys as used
by VeraCrypt.
- Add Camellia header decryption checks to all VeraCrypt kernels
- Add test containers for remaining cipher combinations
2018-11-28 14:21:14 +01:00
Jens Steube
fca4f7e8a6
Prepare to use --keyboard-layout-mapping for algorithms other than TC/VC
2018-11-25 18:21:07 +01:00
R. Yushaev
8b04be0e93
Add Kuznyechik support for VeraCrypt kernels
...
Adds support for the Russian cipher specified in GOST R 34.12-2015, also
known as Kuznyechik (Grasshopper).
- Add Kuznyechik header decryption checks to all VeraCrypt kernels
- Add test containers for available Kuznyechik cipher combinations
2018-11-22 16:07:45 +01:00
Jens Steube
c15f741dca
Fixed out-of-boundary read in DPAPI masterkey file v2 OpenCL kernel
2018-11-21 14:55:22 +01:00
Jens Steube
ed8384d4bc
OpenCL Runtime: Disable auto-vectorization for Intel OpenCL runtime to workaround hanging JiT since version 18.1.0.013
2018-11-21 12:03:47 +01:00
Jens Steube
c9da60c73a
Fixed thread count maximum for pure kernels in straight attack mode
2018-11-20 15:29:24 +01:00
Jens Steube
e770449702
OpenCL Runtime: Use our own yielding technique for synchronizing rather than vendor specific
...
Parameter: Rename --nvidia-spin-damp to --spin-damp (now accessible for all devices)
2018-11-20 12:32:24 +01:00
Jens Steube
ae577410d0
OpenCL Device: Do a real query on OpenCL local memory type instead of just assuming it
2018-11-20 10:06:34 +01:00
jsteube
1156cf7207
Fixed invalid hardware monitor detection in benchmark mode
...
Fixes https://github.com/hashcat/hashcat/issues/1787
2018-11-17 14:40:30 +01:00
Jens Steube
49fc7d45b7
- Keymaps: Added hashcat keyboard mapping us.hckmap (can be used as template)
...
- Keymaps: Added hashcat keyboard mapping de.hckmap
2018-11-15 22:29:03 +01:00
Jens Steube
5d5ac1c935
Prepare for on-the-fly keyboard layout substituations required to crack booting TrueCrypt/VeraCrypt volumes
2018-11-15 14:35:51 +01:00
Jens Steube
9afed4b88d
Pidfile: Treat a corrupted pidfile like a not existing pidfile
2018-11-14 09:32:06 +01:00
Royce Williams
3bf663bee1
clarify xxHash change; add 'APFS' to Apple File System refs
2018-11-12 11:31:01 -09:00
Royce Williams
55f319b572
changes.txt wording/fixes
2018-11-12 11:03:24 -09:00
Jens Steube
06b39dc3d5
Startup: Show OpenCL runtime initialization message (per device)
2018-11-12 20:45:05 +01:00
Jens Steube
a402822646
Fixed output of --speed-only and --progress-only in case a fast hash is used in combination with --slow-candidates
2018-11-12 14:20:42 +01:00
Jens Steube
a4200ba167
Added hash-mode 18300 (Apple File System)
...
Fixes https://github.com/hashcat/hashcat/issues/1686
2018-11-12 11:37:01 +01:00
Jens Steube
a5818facf2
Brain: Set --brain-client-features default from 3 to 2
2018-11-11 10:13:38 +01:00
Jens Steube
2aff01b20e
Hardware Monitor: Renamed --gpu-temp-abort to --hwmon-temp-abort
...
Hardware Monitor: Renamed --gpu-temp-disable to --hwmon-disable
Fixed invalid warnings about throttling in case --hwmon-disable was used
Fixes https://github.com/hashcat/hashcat/issues/1757
2018-11-09 12:48:27 +01:00
R. Yushaev
34aa899a05
Add RIPEMD-160 test containers for VeraCrypt modes
...
- Tests: Add hash-mode 13711 (VeraCrypt PBKDF2-HMAC-RIPEMD160 + XTS 512 bit)
- Tests: Add hash-mode 13712 (VeraCrypt PBKDF2-HMAC-RIPEMD160 + XTS 1024 bit)
- Tests: Add hash-mode 13713 (VeraCrypt PBKDF2-HMAC-RIPEMD160 + XTS 1536 bit)
2018-11-09 11:35:23 +01:00
R. Yushaev
5eaee33094
Add test containers for VeraCrypt modes
...
There were testing containers for TrueCrypt hash modes (62XY),
but none for the VeraCrypt ones (137XY). This commit adds test
cases for all currently attackable hash/cipher combinations,
except RIPEMD-160 and those with boot-mode.
RIPEMD-160 is considered deprecated in VeraCrypt since 2015.
- Tests: Add hash-mode 13721 (VeraCrypt PBKDF2-HMAC-SHA512 + XTS 512 bit)
- Tests: Add hash-mode 13722 (VeraCrypt PBKDF2-HMAC-SHA512 + XTS 1024 bit)
- Tests: Add hash-mode 13723 (VeraCrypt PBKDF2-HMAC-SHA512 + XTS 1536 bit)
- Tests: Add hash-mode 13731 (VeraCrypt PBKDF2-HMAC-Whirlpool + XTS 512 bit)
- Tests: Add hash-mode 13732 (VeraCrypt PBKDF2-HMAC-Whirlpool + XTS 1024 bit)
- Tests: Add hash-mode 13733 (VeraCrypt PBKDF2-HMAC-Whirlpool + XTS 1536 bit)
- Tests: Add hash-mode 13751 (VeraCrypt PBKDF2-HMAC-SHA256 + XTS 512 bit)
- Tests: Add hash-mode 13752 (VeraCrypt PBKDF2-HMAC-SHA256 + XTS 1024 bit)
- Tests: Add hash-mode 13753 (VeraCrypt PBKDF2-HMAC-SHA256 + XTS 1536 bit)
- Tests: Add hash-mode 13771 (VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 512 bit)
- Tests: Add hash-mode 13772 (VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 1024 bit)
- Tests: Add hash-mode 13773 (VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 1536 bit)
2018-11-08 17:14:58 +01:00
Jens Steube
a3b8bba074
Added some missing changes in changes.txt
2018-11-08 13:41:16 +01:00
R. Yushaev
47bd838e25
Add VeraCrypt Streebog support
...
VeraCrypt added the possibility to use Streebog-512 as hashing algorithm
for the key derivation. This commit adds the necessary VeraCrypt kernels
as well as additional HMAC-Streebog kernels.
- Add hash-mode 13771: VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 512 bit
- Add hash-mode 13772: VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 1024 bit
- Add hash-mode 13773: VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 1536 bit
- Add hash-mode 11750: HMAC-Streebog-256 (key = $pass), big-endian
- Add hash-mode 11760: HMAC-Streebog-256 (key = $salt), big-endian
- Add hash-mode 11860: HMAC-Streebog-512 (key = $salt), big-endian
- Add test suite for hash-modes 11750, 11760 and 11860
- Improve pure Streebog kernels
2018-11-08 11:46:31 +01:00
Jens Steube
b1a460ade2
Fixed status output of progress value in case -S and -l used in combination
2018-11-07 14:20:40 +01:00
Jens Steube
2a366741a5
Added new option --kernel-threads to manually override the automatically calculated number of threads
2018-11-06 16:06:06 +01:00
Jens Steube
344ea5b36d
Memory: Reduced default maximum bitmap size from 24 to 18 and give a notice to use --bitmap-max to restore
2018-11-04 10:07:45 +01:00
Jens Steube
399bd2562a
Fixed checking the length of the last token in a hash if it was given the attribute TOKEN_ATTR_FIXED_LENGTH
...
Fixes https://github.com/hashcat/hashcat/issues/1755
2018-11-04 09:41:07 +01:00
Jens Steube
a4a9d29420
Fixed calculation of brain-attack if a given wordlist has the size zero
...
Fixes https://github.com/hashcat/hashcat/issues/1756
2018-11-03 12:20:55 +01:00
Royce Williams
0bd0d9a2ca
misc docs - thanks to honeyakshat999 for README suggestions
2018-11-01 07:33:17 -08:00
Jens Steube
d4dad3e1e3
Added support to use --stdout in brain-client mode
2018-11-01 12:21:32 +01:00
Jens Steube
7feeb0b05f
Added missing changes.txt entries
2018-11-01 12:08:52 +01:00
Jens Steube
ff6e403703
Fixed ignoring --brain-client-features configuration in case brain-server has attack positions informations from a previous run
2018-11-01 12:03:28 +01:00
Jens Steube
175fea4094
Fixed out-of-bounds write in short-term memory of the brain-server
2018-11-01 11:54:40 +01:00
Jens Steube
3b8abb7f0d
Fixed missing call to WSACleanup() to cleanly shutdown windows sockets system
2018-11-01 11:09:37 +01:00
R. Yushaev
a8eb611b1c
Add HMAC-Streebog-512 (pure kernels)
...
Implement HMAC based on GOST 34.11-2012 Streebog-512 as well as a test
case for it. Both the PyGOST + hmac python module and the VeraCrypt HMAC
for Streebog-512 were used as references. The kernels expect the digests
to be in big-endian order according to the RFC examples for Streebog.
Fix two bugs from commit 224315dd62
.
- Add hash-mode 11850: HMAC-Streebog-512 (key = $pass), big-endian
- Add test case for hash-mode 11850
- Bugfix for a3-pure Streebog kernels (modes 11700 and 11800)
- Rename a few Streebog constants in interface.h
2018-10-31 14:42:02 +01:00
philsmd
dbb81fb48e
fixes #1744 : added --stdin-timeout-abort to allow a custom time (in seconds) to wait before abort (use 0 to disabled it)
2018-10-31 11:37:06 +01:00
Jens Steube
61ded2bd54
Fixed missing call to WSAStartup() and client indexing in order to start the brain server on windows
2018-10-31 10:50:16 +01:00
Jens Steube
5f53a9ec32
Fix endianness and invalid separator character in outfile format of hash-mode 16801 (WPA-PMKID-PMK)
2018-10-31 08:55:32 +01:00
Arseniy Sharoglazov
ee873da300
Added hash-modes 18200 (Kerberos 5 AS-REP etype 23)
2018-10-30 19:05:44 +03:00
R. Yushaev
224315dd62
Add pure kernels and tests for Streebog hashes
...
Complete Streebog support with pure kernels that allow for passwords
longer than 64 characters. Provide generic inc_hash_streebog files
for future Streebog-based hash modes (HMAC, PBKDF2, VeraCrypt).
Include streebog support in the test suite. For this, python module
PyGOST is needed. Also add clarification to hash mode description
stating that Streebog hashes are expected in big-endian byte order.
There are several implementations, including PyGOST, which default
to little-endian byte order, while the RFC examples are big-endian.
- Add pure kernels for hash-mode 11700 (Streebog-256)
- Add pure kernels for hash-mode 11800 (Streebog-512)
- Tests: Add hash-modes 11700 (Streebog-256) and 11800 (Streebog-512)
2018-10-29 10:33:30 +01:00
Jens Steube
dc39deba0f
Update version to 5.0.0
2018-10-28 16:51:00 +01:00
Jens Steube
d6fe2c7cd4
The hashcat brain
2018-10-28 16:47:13 +01:00
Jens Steube
24ce7bacae
Updated Intel OpenCL runtime version check
2018-10-26 21:16:32 +02:00
Sein Coray
afd5729e89
Updated changes.txt regarding the hash separator change
2018-10-25 11:40:47 +02:00
R. Yushaev
831075b532
Fixed the byte order of digest output for hash-mode 11800 (Streebog-512)
2018-10-25 10:44:24 +02:00
Jens Steube
e2a9409413
Merge pull request #1710 from unix-ninja/master
...
Add support for TOTP (RFC 6238)
2018-10-22 20:49:31 +02:00
Jens Steube
99709a32a3
Allow keepass iteration count to be larger than 999999
2018-10-21 13:32:07 +02:00
Jens Steube
adb1686b9a
Override --quiet and show final status screen in case --status is used
...
Fixes #1720
2018-10-21 11:50:44 +02:00
Jens Steube
fd960aef53
Fix ordering in changes.txt
2018-10-21 10:58:29 +02:00
Royce Williams
a7f8a93723
minor changes.txt edits
2018-10-20 08:27:22 -08:00
Jens Steube
b0077860c7
Workaround some padding issues with host compiler and OpenCL JiT on 32 and 64 bit systems
2018-10-20 12:41:41 +02:00
R. Yushaev
4d457ca141
Fix conflicts caused by PR GH-1717
2018-10-19 10:53:23 +02:00
Jens Steube
5ee3e502f8
Fixed missing wordlist encoding in combinator mode
...
Fixes #1668
2018-10-18 14:19:07 +02:00
unix-ninja
4724e1f589
Add 18100 to changes.txt
2018-10-17 10:42:22 -04:00
philsmd
73ed017daf
stdin: add read timeout checks (abort if no input for a long time)
2018-10-17 10:55:47 +02:00
philsmd
b1465693a3
fixes #1708 : reject invalid masks with only a single ? at the end
2018-10-16 15:59:20 +02:00
R. Yushaev
5c87720acc
Add SHA3 and Keccak
...
The previous hash-mode 5000 covered Keccak-256 only. FIPS changed one
padding byte while adopting Keccak as the SHA3 standard, which gives us
different digests. Now we have separate kernels for SHA3 and Keccak.
- Added hash-mode 17300 = SHA3-224
- Added hash-mode 17400 = SHA3-256
- Added hash-mode 17500 = SHA3-384
- Added hash-mode 17600 = SHA3-512
- Added hash-mode 17700 = Keccak-224
- Added hash-mode 17800 = Keccak-256
- Added hash-mode 17900 = Keccak-384
- Added hash-mode 18000 = Keccak-512
- Removed hash-mode 5000 = SHA-3 (Keccak)
2018-10-15 16:06:31 +02:00
Jens Steube
6afe989bed
Fixed the tokenizer configuration in postgres hash parser
2018-10-14 11:38:31 +02:00
Jens Steube
1b980cf010
Allow hashfile for -m 16800 to be used with -m 16801
2018-09-29 11:52:21 +02:00
Michael Sprecher
1892b842d7
Increased the maximum size of edata2 in Kerberos 5 TGS-REP etype 23
2018-09-12 12:25:02 +02:00
Royce Williams
3a1232573e
mention new passhthrough hybrid rules in changes.txt
2018-09-08 17:42:35 -08:00
jsteube
52c52836e3
Add new option --slow-candidates which allows hashcat to generate passwords on-host
2018-09-01 12:31:17 +02:00
philsmd
2933f3320a
outfile check: performance improvement by using binary instead of linear search
2018-08-31 12:55:05 +02:00
Jens Steube
a134ea52b3
Fixed a race condition in status view leading to out-of-bound reads
2018-08-30 21:31:05 +02:00
Jens Steube
3e149843ae
Fixed detection of unique ESSID in WPA-PMKID-* parser
2018-08-30 11:13:44 +02:00
philsmd
93216c76a3
outfile check: improve response time when quitting hashcat
2018-08-26 17:51:40 +02:00
jsteube
a3ee4d7188
Do not allocate memory segments for bitmap tables if we dont need it, for example in benchmark mode
2018-08-24 12:59:28 +02:00
philsmd
0f449b6440
hcstat2: allow to use option --markov-hcstat2 instead of just --markov-hcstat
2018-08-23 09:10:54 +02:00
philsmd
15fb40bc87
Removed duplicated words in example.dict
2018-08-20 11:58:21 +02:00
jsteube
27db8ced7e
Add a tracker for salts, amplifier and iterations to status screen
2018-08-18 01:41:07 +02:00
Michael Sprecher
e975612f82
Fixed the ciphertext max length in Ansible Vault parser
2018-08-16 12:13:22 +02:00
Michael Sprecher
5536ab9917
Getting rid of OPTS_TYPE_HASH_COPY for Ansible Vault
2018-08-15 23:32:58 +02:00
philsmd
fd12fc4e13
changes: updated docs/changes.txt with tab completion and -a 7 --stdout change log
2018-08-15 13:40:14 +02:00
Jens Steube
ce9b56e06c
Allow bitcoin master key length not be exactly 96 byte a multiple of 16
2018-08-14 15:39:39 +02:00