1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-12-23 15:18:16 +00:00
hashcat/tools/test_modules
Jens Steube 1091feb85d
Merge pull request #1838 from s3inlc/test-plugin-10_12
Added test modules for mode 10 and 12
2018-12-22 22:27:58 +01:00
..
m00000.pm Add test modules and helper functions 2018-12-21 12:16:11 +01:00
m00010.pm added new test module for mode 10 and 12 2018-12-22 22:18:49 +01:00
m00012.pm added new test module for mode 10 and 12 2018-12-22 22:18:49 +01:00
m00100.pm Add test modules and helper functions 2018-12-21 12:16:11 +01:00
m00110.pm Add test modules and helper functions 2018-12-21 12:16:11 +01:00
m00120.pm Add test modules and helper functions 2018-12-21 12:16:11 +01:00
m01000.pm Add module_preprocess_hashlist hook for tests 2018-12-22 19:29:24 +01:00
m01500.pm Add module_preprocess_hashlist hook for tests 2018-12-22 19:29:24 +01:00
m05600.pm Add module_preprocess_hashlist hook for tests 2018-12-22 19:29:24 +01:00
m18400.pm Add module_preprocess_hashlist hook for tests 2018-12-22 19:29:24 +01:00
m18500.pm Added new test module for mode 18500 2018-12-22 21:10:00 +01:00
m18600.pm Add module_preprocess_hashlist hook for tests 2018-12-22 19:29:24 +01:00
README.md Limit single mode to 31 in general as in old test.pl 2018-12-22 21:13:34 +01:00

Hashcat test modules

Each module provides the functions module_generate_hash and module_verify_hash. The first parameter to module_generate_hash is the password, which can be either in ASCII or binary (packed) form. The module_verify_hash function accepts a line from the cracks file, without the newline characters.

During single and passthrough tests the module_generate_hash function must provide random values (e.g. salt) for hash generation if necessary. The test.pl script offers a few handy functions like random_hex_string, random_numeric_string and random_bytes. You can implement your own salt generation functions, if your mode has specific requirements.

During verify tests the module_verify_hash function must parse the hash:password line and calculate a hash by passing all necessary data to module_generate_hash. How you pass it is up to you, as long as the first parameter is the password.

Important: You have to call pack_if_HEX_notation as soon as you have parsed the password, or your tests will fail on passwords in the $HEX[...] format.

If the algorithm has ambiguous hashes (e.g. partial case-insensetivity), the test module can provide an optional function module_preprocess_hashlist. It recieves a reference to the hashlist array and can unify the hashes in a way that guarantees the match with the output of module_verify_hash.

Examples

  • For the most basic test modules, see m00000.pm and m00100.pm
  • For the basic salted hash tests, see m00110.pm and m00120.pm
  • For some sligthly more complex modules with PBKDF2 and encryption, see m18400.pm and m18600.pm
  • For a test module with hashlist preprocessing and a custom salt generation algorithm, see m05600.pm

NOTE:

In order to not have double work while migrating existing code to test modules, here's a work sheet for everyone who wants to contribute. Simply put your name to reserve a particular mode here:

https://docs.google.com/spreadsheets/d/14uxfwDiq316Qad0ILavWD2eeYSVr4vn2HD58hdlL35g/edit#gid=0