1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-12-01 20:38:14 +00:00
Commit Graph

804 Commits

Author SHA1 Message Date
philsmd
095fbb11d7
changes.txt: mention the better ASCII verification for blockchain hashes 2019-12-13 10:42:54 +01:00
Jens Steube
bfd95d42f6 - OpenCL Runtime: Reenabled support for Intel GPU OpenCL runtime 2019-11-27 10:28:12 +01:00
Jens Steube
a63aa679d3 Few changes to -m 21600 and move -m 124 and -m 10000 to pure Framework category 2019-11-26 17:16:18 +01:00
Jamie R
ce17418b27 add web2py pbkdf2-hmac-sha512 variant 2019-11-24 14:49:13 +00:00
Chick3nman
bc4fa93401
Add a few missing changes 2019-11-18 01:26:13 -06:00
philsmd
db91fe6981 Added -m 21700 = Electrum 4 and -m 21800 = Electrum 5 2019-11-16 10:48:52 +01:00
Jens Steube
b02fe8e076 Mark Intel OpenCL CPU runtime as broken for hash-mode 15300 2019-11-05 20:44:19 +01:00
Jens Steube
a8555fa048 Support use of all available CPU cores for hash-mode specific hooks 2019-11-03 12:05:52 +01:00
Jens Steube
95920f1ef3 Startup Checks: Prevent the user to modify options which are overwritten automatically in benchmark mode 2019-10-25 10:05:56 +02:00
Jens Steube
a0284b8378 Fixed invalid use of --hex-wordlist if encoded wordlist string is larger than length 256 2019-10-08 12:33:11 +02:00
Jens Steube
7c327e314a Update changes.txt, add entry on documentations 2019-08-14 12:35:23 +02:00
Jens Steube
706d69ba08 Add SolarWinds Orion info to readme and changes 2019-08-08 11:30:24 +02:00
Jens Steube
884f003725 Fixed some memory leaks in case mask-files are used in optimized mode 2019-08-07 14:20:32 +02:00
Jens Steube
ca31ef43af Fixed race condition in maskfile mode by using a dedicated flag for restore execution 2019-08-06 14:07:43 +02:00
Jens Steube
97c9e86d15 Filehandling: Print a truncation warning in case an oversized line was detected 2019-08-06 12:22:24 +02:00
Jens Steube
d1ca061577 Update docs/changes.txt with recent changes 2019-08-05 12:09:55 +02:00
Jens Steube
6ecc662451
Merge pull request #2115 from matrix/zip_support_1
Add support to load wordlists in zip format
2019-07-30 15:55:06 +02:00
Gabriele Gristina
b54ad7981f update repo and re-apply zip patch 2019-07-29 18:42:50 +02:00
Gabriele Gristina
bbee1890cd Added hash-mode: sha1(md5(pass).salt) 2019-07-26 01:49:35 +02:00
Jens Steube
c34fcabb4b Add missing docs/ entry for -m 20600 2019-06-22 16:05:02 +02:00
Jens Steube
2cda236a18 OpenCL Runtime: Do not run a shared- and constant-memory size check if their memory type is of type global memory (typically CPU) 2019-06-22 16:01:38 +02:00
Jens Steube
62d5d2dfbb OpenCL Runtime: Workaround ROCm OpenCL driver problem trying to write temporary file into readonly folder by setting TMPDIR environment variable 2019-06-17 17:35:23 +02:00
Jens Steube
dbbdb7e5ac WipZip cracking: Added two byte early reject, resulting in higher cracking speed 2019-06-16 11:41:42 +02:00
Jens Steube
68e39c2e47 Startup Checks: Improved the pidfile check: Do not just check for existing PID but also check executable filename 2019-06-03 15:43:56 +02:00
Jens Steube
d0f9464273
Merge pull request #2037 from s3inlc/master
Adjusted changes and added pkzip in readme
2019-05-20 11:58:33 +02:00
Sein Coray
ef63feae0d
adjusted changes and added pkzip in readme 2019-05-20 07:14:12 +02:00
Jens Steube
686d71397a
Merge pull request #2032 from s3inlc/master
Adding pkzip stream cipher kernels 20500 and 20510
2019-05-17 18:36:21 +02:00
philsmd
0c8473bab7
changelog: mention rule engine fixes 2019-05-17 14:13:49 +02:00
Sein Coray
15cbaa0f59
adding pkzip stream cipher kernels 20500 and 20510 2019-05-17 14:11:22 +02:00
Sein Coray
0ea676907a
Merge remote-tracking branch 'upstream/master' 2019-05-15 14:33:32 +02:00
Jens Steube
2eebc27ec1
Merge pull request #2008 from vlohacks/master
New modules for Python passlib pbkdf2 sha variants
2019-05-15 09:51:19 +02:00
Jens Steube
85f7d50fb8
Merge pull request #2021 from philsmd/master
added support for $electrum$3 hashes (-m 16600)
2019-05-14 11:57:46 +02:00
Sein Coray
e39a9284e1
Merge remote-tracking branch 'upstream/master' 2019-05-14 11:48:44 +02:00
philsmd
07a1bdb12c
added support for $electrum$3 hashes (-m 16600) 2019-05-13 14:34:15 +02:00
Jens Steube
2b0f657564 Limit some modules to 64 threads in order to get additional L1 cache 2019-05-10 23:51:09 +02:00
Jens Steube
ba43223c27 Add missing entry in changes.txt 2019-05-10 17:26:22 +02:00
Sein Coray
e4d8e4a7ad
bring fork up-to-date 2019-05-09 17:23:59 +02:00
vlo
23c3e723f7 Implemeted table for alternate base64
Implemented alternate base64 table, removed replacement code in modules.
Fixed: whitespace/indent issues
Fixed: unsigned to signed implicit typecasts
Added new algorithm information to readme.txt and changes.txt
2019-05-09 08:51:21 +02:00
Jens Steube
a01cc28ec6
Merge pull request #2014 from hashcat/master
Backports
2019-05-07 21:48:47 +02:00
philsmd
f45a726376
fixes #2012: add Deflate support for 7-Zip using zlib 2019-05-07 15:31:11 +02:00
Jens Steube
6fd936b43a Removed --opencl-platforms filter in order to force backend device numbers to stay constant 2019-04-30 16:24:13 +02:00
Jens Steube
4045e60021 Add nvrtc wrapper for later use 2019-04-26 10:03:16 +02:00
jsteube
b9aaaf7809 Move 198xx DiskCryptor to 200xx to not collide with Kerberos 5, etype 17, Pre-Auth 2019-04-20 19:41:37 +02:00
jsteube
ac4f8e688a Dependencies: Updated OpenCL-Headers to latest version from GitHub master repository
Dependencies: Updated OpenCL function wrapper declarations accordingly to updated OpenCL-Headers
2019-04-20 09:34:13 +02:00
jsteube
5f3d9e08b9 Kernel Compile: Removed -cl-std= from all kernel build options since we're compatible to all OpenCL versions 2019-04-20 08:46:25 +02:00
Jens Steube
e7ae8e6863 Requirements: Update runtime check for minimum NVIDIA driver version from 367.x to 418.56 or later 2019-04-18 12:21:12 +02:00
Jens Steube
27f130ea90 Kernel Cache: Reactivate OpenCL runtime specific kernel caches 2019-04-13 14:47:41 +02:00
jsteube
b7cdca09c4 OpenCL Runtime: Workaround JiT compiler error on ROCM 2.3 driver if the 'inline' keyword is used in function declaration 2019-04-13 13:46:55 +02:00
jsteube
7bd3d55a3f Add missing OpenCL kernel for -m 19812 and -m 19813 2019-04-08 11:07:12 +02:00
philsmd
60c255a69d
added -m 19800 = DiskCryptor AES 2019-04-07 18:08:56 +02:00
jsteube
b8d609ba16 WPA/WPA2 cracking: In the potfile, replace password with PMK in order to detect already cracked networks across all WPA modes 2019-04-02 11:24:22 +02:00
jsteube
98f130e715 Fix missing changes entry 2019-03-28 13:08:23 +01:00
Sein Coray
959852a1aa
Merge branch 'master' of https://github.com/hashcat/hashcat 2019-03-25 10:47:00 +01:00
Sein Coray
97249ba1ca
added pkzip kernels 17200, 17210, 17220 and 17230 2019-03-21 20:18:39 +01:00
Jens Steube
af129d32da
Merge pull request #1941 from s3inlc/master
Added hash mode 19500
2019-03-19 10:44:06 +01:00
jsteube
5ef67a8ab7 Apply previous blowfish optimization for -m 3200 also on -m 9000 and -m 18600 2019-03-18 12:42:47 +01:00
Sein Coray
1143cef606
Merge branch 'master' into master 2019-03-18 09:48:09 +01:00
jsteube
5ecbcde945 Cracking bcrypt: Use a feedback from the OpenCL runtime to dynamically find out optimal thread count 2019-03-17 14:17:35 +01:00
jsteube
218322f630 Support for inline VeraCrypt PIM Brute-Force 2019-03-15 21:48:49 +01:00
jsteube
111889d3fc Keep Guessing: No longer automatically activate --keep-guessing for modes 9720, 9820, 14900 and 18100 2019-03-13 19:02:24 +01:00
jsteube
b99d392e78 OpenCL Runtime: Disable OpenCL kernel cache on Apple for Intel CPU (throws CL_BUILD_PROGRAM_FAILURE for no reason) 2019-03-10 10:48:37 +01:00
philsmd
ae77c680f8
added note about $electrum2$ to changelog 2019-03-08 13:44:33 +01:00
Sein Coray
ee97d18af9
Added hash mode 19500 2019-03-06 21:15:09 +01:00
jsteube
eb07d2108c Fixed cracking of NetNTLMv1 passwords in mask-attack mode if mask > length 16 (optimized kernels only) 2019-03-05 05:14:34 +01:00
jsteube
b2347f0962 Building: Updated BUILD.md 2019-03-03 10:31:24 +01:00
jsteube
0b1169e523 My Wallet: Added additional plaintext pattern used in newer versions 2019-03-02 21:58:50 +01:00
jsteube
4359418918 OpenCL Runtime: Not using amd_bytealign (amd_bitalign is fine) on AMDGPU driver drastically reduces JiT segfaults 2019-03-01 15:34:49 +01:00
jsteube
23917455ef Added hash-mode 19300 sha1(..) 2019-02-28 20:00:52 +01:00
jsteube
87c24200da Added QNX /etc/shadow hash cracking support
- Added hash-mode 19000 QNX /etc/shadow (MD5)
- Added hash-mode 19100 QNX /etc/shadow (SHA256)
- Added hash-mode 19200 QNX /etc/shadow (SHA512)
Implements #35
2019-02-27 17:53:00 +01:00
jsteube
8f38bb9172 Add some missing notes on bugfixes to changes.txt 2019-02-26 21:53:29 +01:00
jsteube
5da1e4b872 Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
jsteube
2c0c82c8af OpenCL Runtime: Workaround JiT compiler error on AMDGPU driver compiling WPA-EAPOL-PBKDF2 OpenCL kernel 2019-02-24 09:10:37 +01:00
jsteube
761475b224 OpenCL Runtime: Improve ROCM detection and make sure to not confuse with recent AMDGPU drivers 2019-02-23 22:50:19 +01:00
jsteube
9b916918de Remove some debugging leftovers in unit tests 2019-02-23 17:50:21 +01:00
Jens Steube
306d40a13a Fixed incorrect progress-only result in a special race condition 2019-02-23 12:24:32 +01:00
jsteube
11b1189e53 Fix makefile targets 2019-02-22 21:58:33 +01:00
jsteube
68d6d36761 Binary Distribution: Removed 32 bit binary executeables 2019-02-22 21:36:02 +01:00
jsteube
1769181d08 Some extra steps for -m 18900 2019-02-22 15:50:03 +01:00
jsteube
b4d52e412b Rename -m 18700 to Java Object hashCode() 2019-02-22 09:30:56 +01:00
jsteube
5b35c5c1e6 Tuning Database: Updated hashcat.hctune with new models and refreshed vector width values 2019-02-21 17:15:09 +01:00
jsteube
51eb9ebff7 Added hash-mode 18700 DJB 32 2019-02-21 13:52:01 +01:00
jsteube
9fc193ce47 Bitcoin Wallet: Be more user friendly by allowing a larger data range for ckey and public_key 2019-02-20 16:20:28 +01:00
philsmd
7b3ab9dbcb
fixes 7-Zip parser limits for encrypted/decrypted data lengths 2019-02-15 18:49:16 +01:00
jsteube
158b93832c Fixed cracking of Cisco-PIX and Cisco-ASA MD5 passwords in mask-attack mode if mask > length 16 2019-02-15 15:50:58 +01:00
R. Yushaev
b5a7e967c1 Add support for Open Document Format 1.1
Contains a kernel for the ODF 1.1 encryption implemented in OpenOffice.
The algorithm uses a SHA-1 checksum, a PBKDF2-HMAC-SHA1 key derivation
with 1024 iterations and Blowfish-CFB encryption.

Valid hashes can be extracted with the libreoffice2john.py script,
available from the John the Ripper Jumbo repository at
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/libreoffice2john.py

You have to remove the filename suffix at the end of the hash before
passing it to hashcat. Also see 'hashcat -m18600 --example-hashes'.

You can leave the filename prefix if you use the --username option to
process those hashes.

 - Add hash-mode 18600 (Open Document Format (ODF) 1.1 (SHA-1, Blowfish))
 - Tests: add hash-mode 18600 (Open Document Format (ODF) 1.1 (SHA-1, Blowfish))
2018-12-14 13:23:52 +01:00
Jens Steube
376baa2b10
Merge pull request #1814 from s3inlc/algorithm/1652
Added hash mode 18500 sha1(md5(md5($pass)))
2018-12-13 14:21:22 +01:00
Sein Coray
a70a0513bf
Added hash mode 18500 sha1(md5(md5($pass)))
closes hashcat/hashcat#1652
2018-12-10 16:11:11 +01:00
philsmd
7646509234
fixed validation of the --brain-client-features value 2018-12-10 13:16:41 +01:00
Jens Steube
15ece0902f
Merge pull request #1804 from Naufragous/odf-cracking
Add support for Open Document Format 1.2
2018-12-07 09:36:31 +01:00
Jens Steube
9d213147e8
Merge pull request #1805 from mcovalt/electrum_salt_type_2
Electrum Salt-Type 2
2018-12-07 09:33:13 +01:00
R. Yushaev
6a5b0c821e Add support for Open Document Format 1.2
Contains a kernel for the latest ODF 1.2 encryption implemented in
LibreOffice. The algorithm uses a SHA-256 checksum, a PBKDF2-HMAC-SHA1
key derivation with 100000 iterations and key stretching and AES-CBC
encryption.

Valid hashes can be extracted with the libreoffice2john.py script,
available from the John the Ripper Jumbo repository at
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/libreoffice2john.py

You have to remove the filename suffix at the end of the hash before
passing it to hashcat. Also see 'hashcat -m18400 --example-hashes'.

You can leave the filename prefix if you use the --username option to
process those hashes.

 - Add hash-mode 18400 (Open Document Format (ODF) 1.2 (SHA-256, AES))
 - Tests: add hash-mode 18400 (Open Document Format (ODF) 1.2 (SHA-256, AES))
2018-12-06 18:00:09 +01:00
Sein Coray
9a872a6775
Added changes for fixed output of IKE PSK hashes 2018-12-06 14:42:17 +01:00
Matt Covalt
71d9369a70 Correct Electrum Wallet Salt-Type support 2018-12-05 10:53:14 -08:00
philsmd
2ee7306322
Set github master to non-production mode 2018-12-04 11:54:05 +01:00
Jens Steube
0b2ffec379 Fixed selection of OpenCL devices (-d) if there's more than 32 OpenCL devices installed 2018-11-30 22:59:43 +01:00
R. Yushaev
baf47d409e Add Camellia support for VeraCrypt kernels
Adds suport for the Japanese cipher Camellia with 256-bit keys as used
by VeraCrypt.

 - Add Camellia header decryption checks to all VeraCrypt kernels
 - Add test containers for remaining cipher combinations
2018-11-28 14:21:14 +01:00
Jens Steube
fca4f7e8a6 Prepare to use --keyboard-layout-mapping for algorithms other than TC/VC 2018-11-25 18:21:07 +01:00
R. Yushaev
8b04be0e93 Add Kuznyechik support for VeraCrypt kernels
Adds support for the Russian cipher specified in GOST R 34.12-2015, also
known as Kuznyechik (Grasshopper).

 - Add Kuznyechik header decryption checks to all VeraCrypt kernels
 - Add test containers for available Kuznyechik cipher combinations
2018-11-22 16:07:45 +01:00
Jens Steube
c15f741dca Fixed out-of-boundary read in DPAPI masterkey file v2 OpenCL kernel 2018-11-21 14:55:22 +01:00
Jens Steube
ed8384d4bc OpenCL Runtime: Disable auto-vectorization for Intel OpenCL runtime to workaround hanging JiT since version 18.1.0.013 2018-11-21 12:03:47 +01:00
Jens Steube
c9da60c73a Fixed thread count maximum for pure kernels in straight attack mode 2018-11-20 15:29:24 +01:00
Jens Steube
e770449702 OpenCL Runtime: Use our own yielding technique for synchronizing rather than vendor specific
Parameter: Rename --nvidia-spin-damp to --spin-damp (now accessible for all devices)
2018-11-20 12:32:24 +01:00
Jens Steube
ae577410d0 OpenCL Device: Do a real query on OpenCL local memory type instead of just assuming it 2018-11-20 10:06:34 +01:00
jsteube
1156cf7207 Fixed invalid hardware monitor detection in benchmark mode
Fixes https://github.com/hashcat/hashcat/issues/1787
2018-11-17 14:40:30 +01:00
Jens Steube
49fc7d45b7 - Keymaps: Added hashcat keyboard mapping us.hckmap (can be used as template)
- Keymaps: Added hashcat keyboard mapping de.hckmap
2018-11-15 22:29:03 +01:00
Jens Steube
5d5ac1c935 Prepare for on-the-fly keyboard layout substituations required to crack booting TrueCrypt/VeraCrypt volumes 2018-11-15 14:35:51 +01:00
Jens Steube
9afed4b88d Pidfile: Treat a corrupted pidfile like a not existing pidfile 2018-11-14 09:32:06 +01:00
Royce Williams
3bf663bee1 clarify xxHash change; add 'APFS' to Apple File System refs 2018-11-12 11:31:01 -09:00
Royce Williams
55f319b572 changes.txt wording/fixes 2018-11-12 11:03:24 -09:00
Jens Steube
06b39dc3d5 Startup: Show OpenCL runtime initialization message (per device) 2018-11-12 20:45:05 +01:00
Jens Steube
a402822646 Fixed output of --speed-only and --progress-only in case a fast hash is used in combination with --slow-candidates 2018-11-12 14:20:42 +01:00
Jens Steube
a4200ba167 Added hash-mode 18300 (Apple File System)
Fixes https://github.com/hashcat/hashcat/issues/1686
2018-11-12 11:37:01 +01:00
Jens Steube
a5818facf2 Brain: Set --brain-client-features default from 3 to 2 2018-11-11 10:13:38 +01:00
Jens Steube
2aff01b20e Hardware Monitor: Renamed --gpu-temp-abort to --hwmon-temp-abort
Hardware Monitor: Renamed --gpu-temp-disable to --hwmon-disable
Fixed invalid warnings about throttling in case --hwmon-disable was used
Fixes https://github.com/hashcat/hashcat/issues/1757
2018-11-09 12:48:27 +01:00
R. Yushaev
34aa899a05 Add RIPEMD-160 test containers for VeraCrypt modes
- Tests: Add hash-mode 13711 (VeraCrypt PBKDF2-HMAC-RIPEMD160 + XTS 512 bit)
 - Tests: Add hash-mode 13712 (VeraCrypt PBKDF2-HMAC-RIPEMD160 + XTS 1024 bit)
 - Tests: Add hash-mode 13713 (VeraCrypt PBKDF2-HMAC-RIPEMD160 + XTS 1536 bit)
2018-11-09 11:35:23 +01:00
R. Yushaev
5eaee33094 Add test containers for VeraCrypt modes
There were testing containers for TrueCrypt hash modes (62XY),
but none for the VeraCrypt ones (137XY). This commit adds test
cases for all currently attackable hash/cipher combinations,
except RIPEMD-160 and those with boot-mode.

RIPEMD-160 is considered deprecated in VeraCrypt since 2015.

 - Tests: Add hash-mode 13721 (VeraCrypt PBKDF2-HMAC-SHA512 + XTS 512 bit)
 - Tests: Add hash-mode 13722 (VeraCrypt PBKDF2-HMAC-SHA512 + XTS 1024 bit)
 - Tests: Add hash-mode 13723 (VeraCrypt PBKDF2-HMAC-SHA512 + XTS 1536 bit)
 - Tests: Add hash-mode 13731 (VeraCrypt PBKDF2-HMAC-Whirlpool + XTS 512 bit)
 - Tests: Add hash-mode 13732 (VeraCrypt PBKDF2-HMAC-Whirlpool + XTS 1024 bit)
 - Tests: Add hash-mode 13733 (VeraCrypt PBKDF2-HMAC-Whirlpool + XTS 1536 bit)
 - Tests: Add hash-mode 13751 (VeraCrypt PBKDF2-HMAC-SHA256 + XTS 512 bit)
 - Tests: Add hash-mode 13752 (VeraCrypt PBKDF2-HMAC-SHA256 + XTS 1024 bit)
 - Tests: Add hash-mode 13753 (VeraCrypt PBKDF2-HMAC-SHA256 + XTS 1536 bit)
 - Tests: Add hash-mode 13771 (VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 512 bit)
 - Tests: Add hash-mode 13772 (VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 1024 bit)
 - Tests: Add hash-mode 13773 (VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 1536 bit)
2018-11-08 17:14:58 +01:00
Jens Steube
a3b8bba074 Added some missing changes in changes.txt 2018-11-08 13:41:16 +01:00
R. Yushaev
47bd838e25 Add VeraCrypt Streebog support
VeraCrypt added the possibility to use Streebog-512 as hashing algorithm
for the key derivation. This commit adds the necessary VeraCrypt kernels
as well as additional HMAC-Streebog kernels.

 - Add hash-mode 13771: VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 512 bit
 - Add hash-mode 13772: VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 1024 bit
 - Add hash-mode 13773: VeraCrypt PBKDF2-HMAC-Streebog-512 + XTS 1536 bit
 - Add hash-mode 11750: HMAC-Streebog-256 (key = $pass), big-endian
 - Add hash-mode 11760: HMAC-Streebog-256 (key = $salt), big-endian
 - Add hash-mode 11860: HMAC-Streebog-512 (key = $salt), big-endian
 - Add test suite for hash-modes 11750, 11760 and 11860
 - Improve pure Streebog kernels
2018-11-08 11:46:31 +01:00
Jens Steube
b1a460ade2 Fixed status output of progress value in case -S and -l used in combination 2018-11-07 14:20:40 +01:00
Jens Steube
2a366741a5 Added new option --kernel-threads to manually override the automatically calculated number of threads 2018-11-06 16:06:06 +01:00
Jens Steube
344ea5b36d Memory: Reduced default maximum bitmap size from 24 to 18 and give a notice to use --bitmap-max to restore 2018-11-04 10:07:45 +01:00
Jens Steube
399bd2562a Fixed checking the length of the last token in a hash if it was given the attribute TOKEN_ATTR_FIXED_LENGTH
Fixes https://github.com/hashcat/hashcat/issues/1755
2018-11-04 09:41:07 +01:00
Jens Steube
a4a9d29420 Fixed calculation of brain-attack if a given wordlist has the size zero
Fixes https://github.com/hashcat/hashcat/issues/1756
2018-11-03 12:20:55 +01:00
Royce Williams
0bd0d9a2ca misc docs - thanks to honeyakshat999 for README suggestions 2018-11-01 07:33:17 -08:00
Jens Steube
d4dad3e1e3 Added support to use --stdout in brain-client mode 2018-11-01 12:21:32 +01:00
Jens Steube
7feeb0b05f Added missing changes.txt entries 2018-11-01 12:08:52 +01:00
Jens Steube
ff6e403703 Fixed ignoring --brain-client-features configuration in case brain-server has attack positions informations from a previous run 2018-11-01 12:03:28 +01:00
Jens Steube
175fea4094 Fixed out-of-bounds write in short-term memory of the brain-server 2018-11-01 11:54:40 +01:00
Jens Steube
3b8abb7f0d Fixed missing call to WSACleanup() to cleanly shutdown windows sockets system 2018-11-01 11:09:37 +01:00
R. Yushaev
a8eb611b1c Add HMAC-Streebog-512 (pure kernels)
Implement HMAC based on GOST 34.11-2012 Streebog-512 as well as a test
case for it. Both the PyGOST + hmac python module and the VeraCrypt HMAC
for Streebog-512 were used as references. The kernels expect the digests
to be in big-endian order according to the RFC examples for Streebog.

Fix two bugs from commit 224315dd62.

 - Add hash-mode 11850: HMAC-Streebog-512 (key = $pass), big-endian
 - Add test case for hash-mode 11850
 - Bugfix for a3-pure Streebog kernels (modes 11700 and 11800)
 - Rename a few Streebog constants in interface.h
2018-10-31 14:42:02 +01:00
philsmd
dbb81fb48e
fixes #1744: added --stdin-timeout-abort to allow a custom time (in seconds) to wait before abort (use 0 to disabled it) 2018-10-31 11:37:06 +01:00
Jens Steube
61ded2bd54 Fixed missing call to WSAStartup() and client indexing in order to start the brain server on windows 2018-10-31 10:50:16 +01:00
Jens Steube
5f53a9ec32 Fix endianness and invalid separator character in outfile format of hash-mode 16801 (WPA-PMKID-PMK) 2018-10-31 08:55:32 +01:00
Arseniy Sharoglazov
ee873da300 Added hash-modes 18200 (Kerberos 5 AS-REP etype 23) 2018-10-30 19:05:44 +03:00
R. Yushaev
224315dd62 Add pure kernels and tests for Streebog hashes
Complete Streebog support with pure kernels that allow for passwords
longer than 64 characters. Provide generic inc_hash_streebog files
for future Streebog-based hash modes (HMAC, PBKDF2, VeraCrypt).

Include streebog support in the test suite. For this, python module
PyGOST is needed. Also add clarification to hash mode description
stating that Streebog hashes are expected in big-endian byte order.
There are several implementations, including PyGOST, which default
to little-endian byte order, while the RFC examples are big-endian.

 - Add pure kernels for hash-mode 11700 (Streebog-256)
 - Add pure kernels for hash-mode 11800 (Streebog-512)
 - Tests: Add hash-modes 11700 (Streebog-256) and 11800 (Streebog-512)
2018-10-29 10:33:30 +01:00
Jens Steube
dc39deba0f Update version to 5.0.0 2018-10-28 16:51:00 +01:00
Jens Steube
d6fe2c7cd4 The hashcat brain 2018-10-28 16:47:13 +01:00
Jens Steube
24ce7bacae Updated Intel OpenCL runtime version check 2018-10-26 21:16:32 +02:00
Sein Coray
afd5729e89 Updated changes.txt regarding the hash separator change 2018-10-25 11:40:47 +02:00
R. Yushaev
831075b532 Fixed the byte order of digest output for hash-mode 11800 (Streebog-512) 2018-10-25 10:44:24 +02:00
Jens Steube
e2a9409413
Merge pull request #1710 from unix-ninja/master
Add support for TOTP (RFC 6238)
2018-10-22 20:49:31 +02:00
Jens Steube
99709a32a3 Allow keepass iteration count to be larger than 999999 2018-10-21 13:32:07 +02:00
Jens Steube
adb1686b9a Override --quiet and show final status screen in case --status is used
Fixes #1720
2018-10-21 11:50:44 +02:00
Jens Steube
fd960aef53 Fix ordering in changes.txt 2018-10-21 10:58:29 +02:00
Royce Williams
a7f8a93723 minor changes.txt edits 2018-10-20 08:27:22 -08:00
Jens Steube
b0077860c7 Workaround some padding issues with host compiler and OpenCL JiT on 32 and 64 bit systems 2018-10-20 12:41:41 +02:00
R. Yushaev
4d457ca141 Fix conflicts caused by PR GH-1717 2018-10-19 10:53:23 +02:00
Jens Steube
5ee3e502f8 Fixed missing wordlist encoding in combinator mode
Fixes #1668
2018-10-18 14:19:07 +02:00
unix-ninja
4724e1f589 Add 18100 to changes.txt 2018-10-17 10:42:22 -04:00
philsmd
73ed017daf
stdin: add read timeout checks (abort if no input for a long time) 2018-10-17 10:55:47 +02:00
philsmd
b1465693a3
fixes #1708: reject invalid masks with only a single ? at the end 2018-10-16 15:59:20 +02:00
R. Yushaev
5c87720acc Add SHA3 and Keccak
The previous hash-mode 5000 covered Keccak-256 only. FIPS changed one
padding byte while adopting Keccak as the SHA3 standard, which gives us
different digests. Now we have separate kernels for SHA3 and Keccak.

 - Added hash-mode 17300 = SHA3-224
 - Added hash-mode 17400 = SHA3-256
 - Added hash-mode 17500 = SHA3-384
 - Added hash-mode 17600 = SHA3-512
 - Added hash-mode 17700 = Keccak-224
 - Added hash-mode 17800 = Keccak-256
 - Added hash-mode 17900 = Keccak-384
 - Added hash-mode 18000 = Keccak-512
 - Removed hash-mode 5000 = SHA-3 (Keccak)
2018-10-15 16:06:31 +02:00
Jens Steube
6afe989bed Fixed the tokenizer configuration in postgres hash parser 2018-10-14 11:38:31 +02:00
Jens Steube
1b980cf010 Allow hashfile for -m 16800 to be used with -m 16801 2018-09-29 11:52:21 +02:00
Michael Sprecher
1892b842d7
Increased the maximum size of edata2 in Kerberos 5 TGS-REP etype 23 2018-09-12 12:25:02 +02:00
Royce Williams
3a1232573e mention new passhthrough hybrid rules in changes.txt 2018-09-08 17:42:35 -08:00
jsteube
52c52836e3 Add new option --slow-candidates which allows hashcat to generate passwords on-host 2018-09-01 12:31:17 +02:00
philsmd
2933f3320a
outfile check: performance improvement by using binary instead of linear search 2018-08-31 12:55:05 +02:00
Jens Steube
a134ea52b3 Fixed a race condition in status view leading to out-of-bound reads 2018-08-30 21:31:05 +02:00
Jens Steube
3e149843ae Fixed detection of unique ESSID in WPA-PMKID-* parser 2018-08-30 11:13:44 +02:00
philsmd
93216c76a3
outfile check: improve response time when quitting hashcat 2018-08-26 17:51:40 +02:00
jsteube
a3ee4d7188 Do not allocate memory segments for bitmap tables if we dont need it, for example in benchmark mode 2018-08-24 12:59:28 +02:00
philsmd
0f449b6440
hcstat2: allow to use option --markov-hcstat2 instead of just --markov-hcstat 2018-08-23 09:10:54 +02:00
philsmd
15fb40bc87
Removed duplicated words in example.dict 2018-08-20 11:58:21 +02:00
jsteube
27db8ced7e Add a tracker for salts, amplifier and iterations to status screen 2018-08-18 01:41:07 +02:00
Michael Sprecher
e975612f82
Fixed the ciphertext max length in Ansible Vault parser 2018-08-16 12:13:22 +02:00
Michael Sprecher
5536ab9917
Getting rid of OPTS_TYPE_HASH_COPY for Ansible Vault 2018-08-15 23:32:58 +02:00
philsmd
fd12fc4e13
changes: updated docs/changes.txt with tab completion and -a 7 --stdout change log 2018-08-15 13:40:14 +02:00
Jens Steube
ce9b56e06c Allow bitcoin master key length not be exactly 96 byte a multiple of 16 2018-08-14 15:39:39 +02:00
jsteube
dad05d9f69 Testing: Workaround some AMD OpenCL runtime segmentation faults 2018-08-09 13:03:22 +02:00
jsteube
103fdf04a1 Fixed a invalid scalar datatype return value in hc_bytealign() where it should be a vector datatype return value 2018-08-09 11:00:08 +02:00
jsteube
762e5d5cda Go back into development mode 2018-08-08 23:01:32 +02:00
jsteube
4963357fac Update to v4.2.1 2018-08-07 14:04:04 +02:00
jsteube
afd1efd59c Fixed a buffer overflow in precompute_salt_md5() in case salt was longer than 64 characters 2018-08-06 15:35:35 +02:00
jsteube
e67195aa11 Try to evaluate available OpenCL device memory and use this information instead of total available OpenCL device memory for autotune 2018-08-05 23:29:54 +02:00
jsteube
1d7e1ba7e5 Unset PRODUCTION 2018-08-03 22:42:09 +02:00
jsteube
a03b5dae57 Update changes.txt 2018-08-02 11:30:29 +02:00
jsteube
844918d00c Added NV Tesla V100 and P100 to tuning database 2018-08-02 01:15:53 +02:00
Michael Sprecher
3a321c8dce
Added hash-mode 16900 = Ansible Vault 2018-08-01 19:44:30 +02:00
jsteube
bdec457951 TrueCrypt/VeraCrypt cracking: Do an entropy check on the TC/VC header on start 2018-07-31 16:18:45 +02:00
jsteube
cd0923f1b8 General file handling: Abort if a byte order mark (BOM) was detected in a wordlist, hashlist, maskfile or rulefile 2018-07-30 13:23:48 +02:00
jsteube
88ebca40b8 Added hash-mode 16800 = WPA-PMKID-PBKDF2
Added hash-mode 16801 = WPA-PMKID-PMK
Renamed lot's of existing WPA related variables to WPA-EAPOL in order to distinguish them with WPA-PMKID variables
Renamed WPA/WPA2 to WPA-EAPOL-PBKDF2
Renamed WPA/WPA2 PMK to WPA-EAPOL-PMK
2018-07-25 16:46:06 +02:00
Michael Sprecher
07840c9fe3
Fixed a missing check for hashmodes using OPTS_TYPE_PT_UPPER causing the self-test to fail when using combinator- and hybrid-mode 2018-07-23 19:09:58 +02:00
philsmd
2e1845ec11
fixes #1624: increase esalt/nonce buffer to 1024 for -m 11400 = SIP 2018-07-23 15:51:39 +02:00
Jens Steube
02a2495349 Switched array pointer types in function declarations in order to be compatible with OpenCL 2.0 2018-07-22 11:47:42 +02:00
Jens Steube
aa63ee000e Update changes.txt 2018-07-21 12:30:12 +02:00
jsteube
c1622d6593 Fixed detection of AMD_GCN version in case the rocm driver is used 2018-07-21 11:52:54 +02:00
Royce Williams
6a8fb403db minor changes.txt grammar 2018-07-18 15:34:04 -08:00
jsteube
8903adb164 Added OpenCL device utilization to status information in machine readable output 2018-07-18 18:14:42 +02:00
jsteube
82457d2904 Fixed a missing check for errors on OpenCL device leading to invalid removal of restore file 2018-07-10 13:17:07 +02:00
jsteube
dd2511233d Fixed a miscalculation in --progress-only mode output for extreme slow kernels like -m 14800 2018-07-05 14:14:39 +02:00
jsteube
81a447b167 Fixed a function declaration attribute in -m 8900 kernel leading to unuseable -m 9300 which shares kernel code with -m 8900 2018-06-21 13:46:53 +02:00
jsteube
32d6b3e10e OpenCL kernels: Add '-pure' prefix to kernel filenames to avoid problems caused by reusing existing hashcat installation folder 2018-06-20 14:18:17 +02:00
jsteube
c28fdf7f44 Added hash-mode 16700 = FileVault 2 2018-06-18 14:38:35 +02:00
jsteube
547025ec47 HCCAPX management: Use advanced hints in message_pair stored by hcxtools about endian bitness of replay counter
Fixed missing code section in -m 2500 and -m 2501 to crack corrupted handshakes with a LE endian bitness base
2018-06-15 17:00:41 +02:00
Royce Williams
c5369e2427 add hex-rules mention to docs 2018-06-14 19:00:35 -08:00
jsteube
469fece141 OpenCL Kernels: Abort session if kernel self-test failed 2018-06-13 12:22:54 +02:00
jsteube
8079abffb0 Fixed a missing kernel in -m 5600 in combination with -a 3 and -O if mask is >= 16 characters 2018-02-28 11:25:52 +01:00
jsteube
83f07febfc Initial v4.1.1 deverloper mode commit 2018-02-28 11:25:23 +01:00
Jens Steube
72fc708042 Fix a bug fix description 2018-02-20 10:55:49 +01:00