mirror of
https://github.com/hashcat/hashcat.git
synced 2025-07-19 04:58:16 +00:00

Improve unit test for -m 8300. In optimized mode, allow longer passwords, domain names, and salts. In both optimized and pure modes, ensure the domain name does not exceed 63 characters. Fix SNMPv3 unit test to produce passwords of at least 8 characters, as required by RFC 3414. Fix file permissions in tools/ folder.
83 lines
1.5 KiB
Perl
83 lines
1.5 KiB
Perl
#!/usr/bin/env perl
|
|
|
|
##
|
|
## Author......: See docs/credits.txt
|
|
## License.....: MIT
|
|
##
|
|
|
|
use strict;
|
|
use warnings;
|
|
|
|
use Net::DNS::RR::NSEC3;
|
|
use Net::DNS::SEC;
|
|
|
|
# we need to restrict the pure password length for the test module to 63 bytes,
|
|
# because we can't have any string (including the pass) of over 63 bytes without "."
|
|
|
|
sub module_constraints { [[1, 63], [1, 63], [1, 32], [1, 24], [1, 44]] }
|
|
|
|
sub get_random_dnssec_salt
|
|
{
|
|
my $domain = shift;
|
|
|
|
my $salt_buf = "";
|
|
|
|
$salt_buf .= ".";
|
|
|
|
$salt_buf .= $domain;
|
|
|
|
#$salt_buf .= ".net";
|
|
|
|
$salt_buf .= ":";
|
|
|
|
$salt_buf .= random_numeric_string (8);
|
|
|
|
return $salt_buf;
|
|
}
|
|
|
|
sub module_generate_hash
|
|
{
|
|
my $word = shift;
|
|
my $salt = shift;
|
|
my $iter = shift // 1;
|
|
|
|
my $combined_salt = get_random_dnssec_salt ($salt);
|
|
|
|
my ($domain, $salt_hex) = split (":", $combined_salt);
|
|
|
|
my $hashalg = Net::DNS::SEC->digtype ("SHA1");
|
|
|
|
my $name = lc ($word . $domain);
|
|
|
|
my $hash_buf = Net::DNS::RR::NSEC3::name2hash ($hashalg, $name, $iter, $salt_hex);
|
|
|
|
my $hash = sprintf ("%s:%s:%s:%d", $hash_buf, $domain, $salt_hex, $iter);
|
|
|
|
return $hash;
|
|
}
|
|
|
|
sub module_verify_hash
|
|
{
|
|
my $line = shift;
|
|
|
|
my @datas = split (":", $line);
|
|
|
|
return if scalar @datas != 5;
|
|
|
|
my ($hash, $domain, $salt, $iter, $word) = @datas;
|
|
|
|
$salt = $domain . ":" . $salt;
|
|
|
|
return unless defined $salt;
|
|
return unless defined $iter;
|
|
return unless defined $word;
|
|
|
|
$word = pack_if_HEX_notation ($word);
|
|
|
|
my $new_hash = module_generate_hash ($word, $salt, $iter);
|
|
|
|
return ($new_hash, $word);
|
|
}
|
|
|
|
1;
|