1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-15 20:39:17 +00:00
hashcat/tools/test_modules
2019-01-20 12:04:06 +01:00
..
m00000.pm Make use of module_constraints more easy and fix some modes 2018-12-29 16:23:29 +01:00
m00010.pm Update test modules to max password length 255 not 256 2018-12-28 22:31:03 +01:00
m00011.pm Update test modules to max password length 255 not 256 2018-12-28 22:31:03 +01:00
m00012.pm Update test modules to max password length 255 not 256 2018-12-28 22:31:03 +01:00
m00020.pm Update test modules to max password length 255 not 256 2018-12-28 22:31:03 +01:00
m00021.pm Update test modules to max password length 255 not 256 2018-12-28 22:31:03 +01:00
m00022.pm Fix password length for optimized mode in constraints for hash-mode 22: 55 - (1 + 20 + 1) 2019-01-03 11:03:35 +01:00
m00023.pm Update test modules to max password length 255 not 256 2018-12-28 22:31:03 +01:00
m00030.pm Fix constraints in -m 30 and -m 40 and return array in -m 40 2019-01-03 12:51:45 +01:00
m00040.pm Fix constraints in -m 30 and -m 40 and return array in -m 40 2019-01-03 12:51:45 +01:00
m00050.pm Authenticated hashes (HMAC) use separate buffers for password and salt, therefore no combination constraints required 2019-01-09 11:24:39 +01:00
m00060.pm Authenticated hashes (HMAC) use separate buffers for password and salt, therefore no combination constraints required 2019-01-09 11:24:39 +01:00
m00100.pm Make use of module_constraints more easy and fix some modes 2018-12-29 16:23:29 +01:00
m00101.pm Added test modules for mode 101, 111 and 112 2019-01-03 13:43:05 +01:00
m00110.pm Update test modules to max password length 255 not 256 2018-12-28 22:31:03 +01:00
m00111.pm Fixed test module constraints 2019-01-03 16:35:41 +01:00
m00112.pm Fixed test module constraints 2019-01-03 16:35:41 +01:00
m00120.pm Update test modules to max password length 255 not 256 2018-12-28 22:31:03 +01:00
m00121.pm Fix spacing 2019-01-09 10:11:50 +01:00
m00122.pm Fix spacing 2019-01-09 10:11:50 +01:00
m00125.pm Fix spacing 2019-01-09 10:11:50 +01:00
m00130.pm Added test modules for mode 130, 131 and 132 2019-01-08 23:00:23 +01:00
m00131.pm Fixed spacing 2019-01-09 10:50:26 +01:00
m00132.pm Fixed spacing 2019-01-09 10:50:26 +01:00
m00133.pm Added test modules for mode 133, 140 and 141 2019-01-08 23:27:20 +01:00
m00140.pm Added test modules for mode 133, 140 and 141 2019-01-08 23:27:20 +01:00
m00141.pm Fixed spacing 2019-01-09 10:51:26 +01:00
m00150.pm Authenticated hashes (HMAC) use separate buffers for password and salt, therefore no combination constraints required 2019-01-09 11:24:39 +01:00
m00160.pm Authenticated hashes (HMAC) use separate buffers for password and salt, therefore no combination constraints required 2019-01-09 11:24:39 +01:00
m00200.pm Make use of module_constraints more easy and fix some modes 2018-12-29 16:23:29 +01:00
m00300.pm Make use of module_constraints more easy and fix some modes 2018-12-29 16:23:29 +01:00
m00400.pm Add -m 400 unit test 2019-01-18 23:09:19 +01:00
m00500.pm Add -m 500 unit test 2019-01-18 23:18:05 +01:00
m00600.pm Add -m 600 unit test 2019-01-18 23:25:30 +01:00
m00900.pm Add MD4 module 2019-01-08 23:32:17 +01:00
m01000.pm Make use of module_constraints more easy and fix some modes 2018-12-29 16:23:29 +01:00
m01300.pm Add SHA224 module 2019-01-08 21:46:10 +01:00
m01400.pm Add SHA256 module 2019-01-08 20:28:25 +01:00
m01500.pm Bring back comparison of hashlist in crackfile 2018-12-27 15:49:18 +01:00
m01700.pm Add unit test for SHA512 2019-01-08 20:10:25 +01:00
m02400.pm Add Cisco-PIX MD5 module 2019-01-08 23:57:58 +01:00
m02500.pm Add -m 2501 module 2019-01-20 10:41:16 +01:00
m03000.pm Add -m 3000 module and unit test 2019-01-20 12:04:06 +01:00
m05100.pm Add -m 5100 module 2019-01-18 22:56:37 +01:00
m05600.pm Make use of module_constraints more easy and fix some modes 2018-12-29 16:23:29 +01:00
m10800.pm Add SHA384 module 2019-01-08 22:03:07 +01:00
m14000.pm Add unit test modules for -m 14000 and -m 14100 2019-01-16 21:01:24 +01:00
m14100.pm Add unit test modules for -m 14000 and -m 14100 2019-01-16 21:01:24 +01:00
m16800.pm Add -m 16800 module and unit test 2019-01-20 11:17:48 +01:00
m18400.pm Update test modules to max password length 255 not 256 2018-12-28 22:31:03 +01:00
m18500.pm Make use of module_constraints more easy and fix some modes 2018-12-29 16:23:29 +01:00
m18600.pm Make use of module_constraints more easy and fix some modes 2018-12-29 16:23:29 +01:00
README.md Make use of module_constraints more easy and fix some modes 2018-12-29 16:23:29 +01:00

Hashcat test modules

Each module provides the functions module_constraints, module_generate_hash and module_verify_hash.

  • The module_constraints function should return the minimum and maximum length of the password, salt and the combination of password and salt in following order: password (pure), salt (pure), password (optimized), salt (optimized) and combination (optimized). Each pair should be set to -1 if the hash mode is not supporting the appropriate field. For example, if a hash-mode does not support a salt, it should be set to -1. The last field (combination) is important if the the password and the salt is stored in the same buffer in the kernel (typically raw hashes only).
  • The first parameter to module_generate_hash is the password, which can be either in ASCII or binary (packed) form. The second parameter is the salt *which can be undefined for unsalted hash modes).
  • The module_verify_hash function accepts a line from the cracks file, without the newline characters.

During single and passthrough tests the module_generate_hash function must provide random values (e.g. salt) for hash generation if necessary. The test.pl script offers a few handy functions like random_hex_string, random_numeric_string and random_bytes. You can implement your own salt generation functions, if your mode has specific requirements.

During verify tests the module_verify_hash function must parse the hash:password line and calculate a hash by passing all necessary data to module_generate_hash. How you pass it is up to you, as long as the first parameter is the password.

Important: You have to call pack_if_HEX_notation as soon as you have parsed the password, or your tests will fail on passwords in the $HEX[...] format.

If the algorithm has ambiguous hashes (e.g. partial case-insensetivity), the test module can provide an optional function module_preprocess_hashlist. It recieves a reference to the hashlist array and can unify the hashes in a way that guarantees the match with the output of module_verify_hash.

Examples

  • For the most basic test modules, see m00000.pm and m00100.pm
  • For the basic salted hash tests, see m00110.pm and m00120.pm
  • For some sligthly more complex modules with PBKDF2 and encryption, see m18400.pm and m18600.pm
  • For a test module with hashlist preprocessing and a custom salt generation algorithm, see m05600.pm

NOTE:

In order to not have double work while migrating existing code to test modules, here's a work sheet for everyone who wants to contribute. Simply put your name to reserve a particular mode here:

https://docs.google.com/spreadsheets/d/14uxfwDiq316Qad0ILavWD2eeYSVr4vn2HD58hdlL35g/edit#gid=0