1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-23 08:38:09 +00:00
Commit Graph

140 Commits

Author SHA1 Message Date
philsmd
b7e5216cf1
fixes #2383: added -m 22700 = MultiBit HD (scrypt) 2020-05-08 10:57:32 +02:00
philsmd
688d904aa0
Added -m 22600 = Telegram Desktop App Passcode (PBKDF2-HMAC-SHA1) 2020-04-08 14:31:47 +02:00
Jens Steube
008072eb65 OpenCL Runtime: Added a warning if OpenCL runtime NEO, Beignet, POCL or MESA is detected and skip associated devices (override with --force) 2020-04-01 10:16:49 +02:00
Jens Steube
ef47811c9d Rename 23911 to 10901 and populate salt->salt_buf[] 2020-03-03 09:55:13 +01:00
Jens Steube
f85a0ea784
Merge pull request #2308 from philsmd/patch-3
update the number of supported hash types in docs/readme.txt
2020-02-11 13:26:10 +01:00
philsmd
6f9e5262af
update the number of supported hash types in docs/readme.txt 2020-02-11 11:42:49 +01:00
philsmd
b6f40c05d6 Added -m 7401 = MySQL $A$ (sha256crypt), closes #2305 2020-02-11 11:36:16 +01:00
philsmd
b51273fb0b
Fixes #1538: Added -m 22500 = MultiBit Classic .key (MD5) 2020-02-06 20:25:14 +01:00
Jens Steube
96a2c36f53 Reduce CUDA Toolkit minimum version to 9.0 (even 8.0 should be sufficient) 2020-02-01 19:32:03 +01:00
philsmd
4887cc47b8
Fixes #2267: added support for -m 22400 = AES Crypt (SHA256) 2020-01-16 12:15:17 +01:00
Jens Steube
ae03120981 Update HASH_NAME in -m 22301 2020-01-15 10:33:36 +01:00
philsmd
706727ad64
Fixed #1534: added -m 22301 = Telegram (SHA256) 2020-01-15 09:18:41 +01:00
philsmd
3353a6fb5d
Added -m 22300 = sha256($salt.$pass.$salt) 2020-01-15 09:16:05 +01:00
Jens Steube
53105abeb4 Added hash-mode: Citrix NetScaler (SHA512) 2020-01-14 17:15:34 +01:00
philsmd
1c1ed72c65
fixes #1117: added -m 22100 = BitLocker 2019-12-31 18:42:13 +01:00
Jens Steube
2cc4244e14 Initial -m 22001 support 2019-12-19 22:14:42 +01:00
Jens Steube
a63aa679d3 Few changes to -m 21600 and move -m 124 and -m 10000 to pure Framework category 2019-11-26 17:16:18 +01:00
Jamie R
ce17418b27 add web2py pbkdf2-hmac-sha512 variant 2019-11-24 14:49:13 +00:00
philsmd
db91fe6981 Added -m 21700 = Electrum 4 and -m 21800 = Electrum 5 2019-11-16 10:48:52 +01:00
Jens Steube
706d69ba08 Add SolarWinds Orion info to readme and changes 2019-08-08 11:30:24 +02:00
Jens Steube
154e2b0b8f Update docs/readme.txt with new header and updated hash-mode list 2019-08-07 15:46:21 +02:00
Jens Steube
a03bffe64f
Merge pull request #2128 from matrix/authme_1
Added hash-mode: AuthMe - sha256(sha256(pass).salt)
2019-08-03 20:24:07 +02:00
Gabriele Gristina
66337ee8f5 update AuthMe patch (2) 2019-08-01 15:12:51 +02:00
Jens Steube
7dba0f311a
Merge pull request #2110 from matrix/sha256_md5_huawei
Added hash-mode: sha256(md5(pass))
2019-07-30 15:34:22 +02:00
Gabriele Gristina
bbee1890cd Added hash-mode: sha1(md5(pass).salt) 2019-07-26 01:49:35 +02:00
Gabriele Gristina
c166242996 Add AuthMe - sha256(sha256().) kernel module 2019-07-23 19:23:06 +02:00
Gabriele Gristina
1aef49d11b update readme/changes txt 2019-07-13 20:51:38 +02:00
Jens Steube
c34fcabb4b Add missing docs/ entry for -m 20600 2019-06-22 16:05:02 +02:00
Sein Coray
ef63feae0d
adjusted changes and added pkzip in readme 2019-05-20 07:14:12 +02:00
Jens Steube
2eebc27ec1
Merge pull request #2008 from vlohacks/master
New modules for Python passlib pbkdf2 sha variants
2019-05-15 09:51:19 +02:00
vlo
84b8a1b1eb Suggested changes for pull request
Fixed: Moved descriptions to appropriate location in readme file
Fixed: Changed name of alternate base64 tables to ab64
Fixed: Changed hash category to HASH_CATEGORY_GENERIC_KDF
2019-05-15 07:29:29 +02:00
Jens Steube
85f7d50fb8
Merge pull request #2021 from philsmd/master
added support for $electrum$3 hashes (-m 16600)
2019-05-14 11:57:46 +02:00
philsmd
07a1bdb12c
added support for $electrum$3 hashes (-m 16600) 2019-05-13 14:34:15 +02:00
vlo
23c3e723f7 Implemeted table for alternate base64
Implemented alternate base64 table, removed replacement code in modules.
Fixed: whitespace/indent issues
Fixed: unsigned to signed implicit typecasts
Added new algorithm information to readme.txt and changes.txt
2019-05-09 08:51:21 +02:00
Jens Steube
4045e60021 Add nvrtc wrapper for later use 2019-04-26 10:03:16 +02:00
jsteube
b9aaaf7809 Move 198xx DiskCryptor to 200xx to not collide with Kerberos 5, etype 17, Pre-Auth 2019-04-20 19:41:37 +02:00
Jens Steube
e7ae8e6863 Requirements: Update runtime check for minimum NVIDIA driver version from 367.x to 418.56 or later 2019-04-18 12:21:12 +02:00
jsteube
7bd3d55a3f Add missing OpenCL kernel for -m 19812 and -m 19813 2019-04-08 11:07:12 +02:00
philsmd
60c255a69d
added -m 19800 = DiskCryptor AES 2019-04-07 18:08:56 +02:00
jsteube
9b916918de Remove some debugging leftovers in unit tests 2019-02-23 17:50:21 +01:00
jsteube
1769181d08 Some extra steps for -m 18900 2019-02-22 15:50:03 +01:00
jsteube
b4d52e412b Rename -m 18700 to Java Object hashCode() 2019-02-22 09:30:56 +01:00
jsteube
51eb9ebff7 Added hash-mode 18700 DJB 32 2019-02-21 13:52:01 +01:00
R. Yushaev
b5a7e967c1 Add support for Open Document Format 1.1
Contains a kernel for the ODF 1.1 encryption implemented in OpenOffice.
The algorithm uses a SHA-1 checksum, a PBKDF2-HMAC-SHA1 key derivation
with 1024 iterations and Blowfish-CFB encryption.

Valid hashes can be extracted with the libreoffice2john.py script,
available from the John the Ripper Jumbo repository at
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/libreoffice2john.py

You have to remove the filename suffix at the end of the hash before
passing it to hashcat. Also see 'hashcat -m18600 --example-hashes'.

You can leave the filename prefix if you use the --username option to
process those hashes.

 - Add hash-mode 18600 (Open Document Format (ODF) 1.1 (SHA-1, Blowfish))
 - Tests: add hash-mode 18600 (Open Document Format (ODF) 1.1 (SHA-1, Blowfish))
2018-12-14 13:23:52 +01:00
Sein Coray
e0c2e4404e
Added new hash mode 18500 to readme 2018-12-10 16:50:58 +01:00
Jens Steube
15ece0902f
Merge pull request #1804 from Naufragous/odf-cracking
Add support for Open Document Format 1.2
2018-12-07 09:36:31 +01:00
R. Yushaev
6a5b0c821e Add support for Open Document Format 1.2
Contains a kernel for the latest ODF 1.2 encryption implemented in
LibreOffice. The algorithm uses a SHA-256 checksum, a PBKDF2-HMAC-SHA1
key derivation with 100000 iterations and key stretching and AES-CBC
encryption.

Valid hashes can be extracted with the libreoffice2john.py script,
available from the John the Ripper Jumbo repository at
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/libreoffice2john.py

You have to remove the filename suffix at the end of the hash before
passing it to hashcat. Also see 'hashcat -m18400 --example-hashes'.

You can leave the filename prefix if you use the --username option to
process those hashes.

 - Add hash-mode 18400 (Open Document Format (ODF) 1.2 (SHA-256, AES))
 - Tests: add hash-mode 18400 (Open Document Format (ODF) 1.2 (SHA-256, AES))
2018-12-06 18:00:09 +01:00
Matt Covalt
71d9369a70 Correct Electrum Wallet Salt-Type support 2018-12-05 10:53:14 -08:00
Jens Steube
72319875d8 Update version to 5.1.0 2018-12-02 11:58:48 +01:00
Royce Williams
3bf663bee1 clarify xxHash change; add 'APFS' to Apple File System refs 2018-11-12 11:31:01 -09:00