1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-12-24 23:48:39 +00:00
Commit Graph

207 Commits

Author SHA1 Message Date
Jens Steube
c9fba782ed Add minimum password length for -m 20510 2019-05-18 16:29:58 +02:00
Sein Coray
15cbaa0f59
adding pkzip stream cipher kernels 20500 and 20510 2019-05-17 14:11:22 +02:00
vlo
14dd1aaaeb Added support for passlib pbkdf2-sha256 and sha1
Added: Module for pbkdf2-sha256
Added: Module for pbkdf2-sha1
Cleanup: Avoid magic values for hash lengths
Cleanup: Coding style
2019-05-08 09:24:12 +02:00
vlo
003e23bae8 Change hash mode of addition, add test module
Changed pbkdf2-sha512 Perl passlib hash module hashmode to 20200
(assigned by maintainer)

Added test module for 20200 module
2019-05-02 22:36:23 +02:00
jsteube
b9aaaf7809 Move 198xx DiskCryptor to 200xx to not collide with Kerberos 5, etype 17, Pre-Auth 2019-04-20 19:41:37 +02:00
Brandon Chalk
0a4ce19915 Merge branch 'master' of https://github.com/hashcat/hashcat 2019-04-16 10:03:05 -07:00
Brandon Chalk
5adb941f9a Test module variable scope fix 2019-04-16 09:58:28 -07:00
philsmd
407d331c9d
tests: fix hash generation of -m 8300 = DNSSEC
The salt needs to be passed AS-IS (in hexadecimal) not converted to binary for the perl module Net::DNS::RR::NSEC3::name2hash.

Thank you very much
2019-04-13 19:10:52 +02:00
Brandon Chalk
95c74c52c1 Add hash modes 19800 (krb5pa etype 17) and 19900 (krb5pa etype 18) 2019-04-09 21:58:42 -07:00
philsmd
ab2f81dd38
tests: add all DiskCryptor test modules 2019-04-08 23:24:27 +02:00
jsteube
4cd98603f5 Add DiskCryptor modules for 1024 bit and 1536 and support for Serpent and Twofish. Be careful, untested yet! 2019-04-08 09:31:31 +02:00
philsmd
60c255a69d
added -m 19800 = DiskCryptor AES 2019-04-07 18:08:56 +02:00
jsteube
eb39e64e19 Fix -m 16800 unit test 2019-04-03 10:46:50 +02:00
Sein Coray
1143cef606
Merge branch 'master' into master 2019-03-18 09:48:09 +01:00
Fist0urs
2a2d352c39 m19700 test cases: remove debug strings 2019-03-13 22:22:54 +01:00
Fist0urs
afb010870a Add hash modes 19600 (krb5tgs enctype 17) and 19700 (krb5tgs enctype 18) 2019-03-13 17:20:04 +01:00
Sein Coray
ee97d18af9
Added hash mode 19500 2019-03-06 21:15:09 +01:00
jsteube
3b4bd54899 Fix -m 10700 unit test maximum password length in pure kernel mode 2019-03-05 08:18:50 +01:00
jsteube
23917455ef Added hash-mode 19300 sha1(..) 2019-02-28 20:00:52 +01:00
jsteube
87c24200da Added QNX /etc/shadow hash cracking support
- Added hash-mode 19000 QNX /etc/shadow (MD5)
- Added hash-mode 19100 QNX /etc/shadow (SHA256)
- Added hash-mode 19200 QNX /etc/shadow (SHA512)
Implements #35
2019-02-27 17:53:00 +01:00
jsteube
5da1e4b872 Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
jsteube
9b916918de Remove some debugging leftovers in unit tests 2019-02-23 17:50:21 +01:00
jsteube
d0d4ce9f8c Added hash-mode 18800 Blockchain, My Wallet, Second Password (SHA256) 2019-02-23 17:45:02 +01:00
jsteube
29fedf2c41 Added hash-mode 18900 Android Backup 2019-02-22 15:49:47 +01:00
jsteube
b4d52e412b Rename -m 18700 to Java Object hashCode() 2019-02-22 09:30:56 +01:00
jsteube
51eb9ebff7 Added hash-mode 18700 DJB 32 2019-02-21 13:52:01 +01:00
jsteube
2d0c57c647 Fix pure kernel maximum password length in -m 9900 test unit 2019-02-20 20:56:25 +01:00
jsteube
568336d35f Fix -m 5800 unit test 2019-02-20 12:48:12 +01:00
jsteube
dc94408cdb Fix maximum password length in -m 5800 2019-02-19 17:46:42 +01:00
jsteube
63fac132e3 Fix cracking streebog 256/512 hmac cracking with password length > 64 2019-02-19 17:17:01 +01:00
jsteube
2f36fb5b44 Remove convert tracker from README.md 2019-02-19 16:30:53 +01:00
Jens Steube
299c8b0f6a
Merge pull request #1922 from 0xbsec/modes_unit_tests_6
Add unit tests for multiple modules
2019-02-19 16:27:11 +01:00
jsteube
aacd2e2e77 Add -m 13600 unit test 2019-02-19 16:20:41 +01:00
jsteube
be4b813a47 Add -m 13500 unit test 2019-02-19 16:13:24 +01:00
jsteube
72a65a4c3e Add -m 13400 unit test 2019-02-19 16:05:42 +01:00
mhasbini
825c977ca4 Add unit tests for multiple modules
13800, 13900, 14400, 14700, 14800, 14900, 15000, 15100 & 15200
2019-02-19 17:02:43 +02:00
jsteube
f36549cf75 Add -m 13300 unit test 2019-02-19 15:50:39 +01:00
jsteube
eccd93a200 Add -m 13200 unit test 2019-02-19 15:31:36 +01:00
jsteube
eb4f5d82d1 Add -m 11900 unit test 2019-02-19 14:58:05 +01:00
jsteube
0e9f445030 Add -m 15400 unit test 2019-02-19 14:28:26 +01:00
jsteube
b8e5daa582 Add -m 12900 unit test 2019-02-19 13:43:14 +01:00
jsteube
b805c73351 Add -m 12800 unit test 2019-02-19 13:37:06 +01:00
jsteube
f7b95aed8b Add -m 10700 unit test 2019-02-19 13:28:48 +01:00
jsteube
72377c1954 Fix -m 10600 max password length in pure kernel mode 2019-02-19 13:17:40 +01:00
jsteube
b8ea0ad0a1 Add -m 10600 unit test 2019-02-19 13:12:41 +01:00
jsteube
89f2ea1bec Do not use next if we mean return 2019-02-19 12:50:57 +01:00
jsteube
1c7e6d0eaf Add -m 10500 unit test 2019-02-19 12:46:25 +01:00
jsteube
b8134ba920 Add -m 10400 unit test 2019-02-19 12:37:43 +01:00
jsteube
07fa13b695 Add -m 10300 unit test 2019-02-19 12:23:46 +01:00
jsteube
942acb266e Update -m 12000 module and unit test for longer salts 2019-02-19 11:12:28 +01:00