mirror of
https://github.com/hashcat/hashcat.git
synced 2024-11-17 21:59:06 +00:00
212 lines
6.5 KiB
Perl
212 lines
6.5 KiB
Perl
#!/usr/bin/env perl
|
|
|
|
##
|
|
## Author......: See docs/credits.txt
|
|
## License.....: MIT
|
|
##
|
|
|
|
use strict;
|
|
use warnings;
|
|
|
|
use Crypt::CBC;
|
|
use Crypt::PBKDF2;
|
|
|
|
sub module_constraints { [[0, 256], [16, 16], [-1, -1], [-1, -1], [-1, -1]] }
|
|
|
|
sub module_generate_hash
|
|
{
|
|
my $word = shift;
|
|
my $salt = shift;
|
|
my $cid = shift // random_number (1, 4);
|
|
my $iter = shift // 2048;
|
|
my $iv = shift;
|
|
my $data = shift;
|
|
|
|
my $key_len = 0;
|
|
|
|
if ($cid == 1) { $key_len = 24; }
|
|
elsif ($cid == 2) { $key_len = 16; }
|
|
elsif ($cid == 3) { $key_len = 24; }
|
|
elsif ($cid == 4) { $key_len = 32; }
|
|
|
|
my $kdf = Crypt::PBKDF2->new
|
|
(
|
|
hash_class => 'HMACSHA1',
|
|
iterations => $iter,
|
|
output_len => $key_len
|
|
);
|
|
|
|
my $salt_bin = pack ("H*", $salt);
|
|
my $iv_bin;
|
|
my $data_bin;
|
|
|
|
my $key = $kdf->PBKDF2 ($salt_bin, $word);
|
|
|
|
my $is_decrypt = defined ($data);
|
|
|
|
if ($is_decrypt == 1)
|
|
{
|
|
$iv_bin = pack ("H*", $iv);
|
|
$data_bin = pack ("H*", $data);
|
|
|
|
my $dec_bin;
|
|
|
|
if ($cid == 1)
|
|
{
|
|
my $aes = Crypt::CBC->new ({
|
|
cipher => "Crypt::DES_EDE3",
|
|
key => $key,
|
|
iv => $iv_bin,
|
|
keysize => $key_len,
|
|
literal_key => 1,
|
|
header => "none",
|
|
padding => "standard",
|
|
});
|
|
|
|
$dec_bin = $aes->decrypt ($data_bin);
|
|
}
|
|
else
|
|
{
|
|
my $aes = Crypt::CBC->new ({
|
|
cipher => "Crypt::Rijndael",
|
|
key => $key,
|
|
iv => $iv_bin,
|
|
keysize => $key_len,
|
|
literal_key => 1,
|
|
header => "none",
|
|
padding => "standard",
|
|
});
|
|
|
|
$dec_bin = $aes->decrypt ($data_bin);
|
|
}
|
|
|
|
## This is a ridiculous check of successfull decryption
|
|
## There are no useable asn1 parsers for perl available
|
|
## We have to rely on a combination of padding check and pattern matching
|
|
## The (minimum) 16 bit should be good enough for a unit test
|
|
|
|
if (length ($dec_bin) < length ($data_bin))
|
|
{
|
|
if (substr ($dec_bin, 0, 1) eq "\x30")
|
|
{
|
|
$data_bin = $dec_bin;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if ($cid == 1)
|
|
{
|
|
$iv_bin = random_bytes (8);
|
|
}
|
|
else
|
|
{
|
|
$iv_bin = random_bytes (16);
|
|
}
|
|
|
|
$data_bin = pack ("H*",
|
|
"308204bd020100300d06092a864886f70d0101010500048204a7308204a30201000282010100b7a2" .
|
|
"e4c254c8174219e60d9cce96737a906797b8edb86af8f055f60db7bd298b0d31d7ce97ebeae393d5" .
|
|
"0e6da5215b58dcd72f4d3cac9e79b6ccaed7da47d2bd04f6a767f5ab7dc0f58beb6298c1e2358ed6" .
|
|
"d3ef441f2326ac5db0027e08ae6c7724ff9a2a220a07e97319b6eff5cd653c7ab8b6ea9f9e89a40a" .
|
|
"b856f036acfd39b1e5926964a024de35052de6d3423fe763569f48869c834750b28f09cecdddb54a" .
|
|
"5526a2c5159d22d24606a2af6c6f47a5d9c04c454896192b8e7b82cf6f6934a23d3495059cb7e43b" .
|
|
"98a20bd5b5782e15d93c8b289838c0a1df82ee429f0708d97aa40d6e75ec57ff12a2714871f241a8" .
|
|
"6f6d8d3472b084aeb748da33e2d50203010001028201004afab8dadc1122e5fb7b225dbf4051005f" .
|
|
"4bdcf84620019589541ff633ea89b6dbf958fb62ae9226bfeac34c639b3e18077bd935792ba63d5e" .
|
|
"352ec2b5be93be57f37a21097f2f06857bceed601ff2041a417f2177b81afb246fd079040af96512" .
|
|
"34ca24a1456ac11641c7e319114cff23f59bcc1bfa769a0e9fcdeab98429973e10caf303f2bcb065" .
|
|
"f22c1cc259556de8377431237da7082cf03ce8da9530be398022f0171d468d92fcabbe776a5e9cf2" .
|
|
"045642868406fd03ab735a70bfec3a951bb3c7a1de0fb3ff63cef23897e4fc3f9c5edf62fd45d058" .
|
|
"fedc7d2fb22ec928984a061053a7138ce0417b5512579a92be0775104c0bc911f68a5e8ede298102" .
|
|
"818100e4e17e2c752dbf1ad1025a074dc5f9c3c5989d23c84594313373d3e4ed0c0ddd74429ab026" .
|
|
"535c5e77549d888835bc94f069ebc5e77fdbd2ddf4c8be6cf777799a6d8d18e2b8cecfc13ab26df8" .
|
|
"b71ca3d94c2193c294042fb1025fdab38ba7aaeafebd8dd1f9d78ee67100693e99255dad6b964ebf" .
|
|
"b7401a03b67d412fabb33502818100cd65067097e307643df1fc8214db1dd7d09342ef01417a2620" .
|
|
"adad87352a58b8fcf07521289da3851623d8d045935fab7ecccc52ba0b86adcb92da76255e00289b" .
|
|
"af9aacd936201861b0021249f4ab5e6020db823af7171aef0bbbd02dc94d2489fc0b68500bd1b7d2" .
|
|
"81ed69fe4a44384161fe906e49bc91e0362b446ec2c521028180497662d40c2c49b966ba758100a2" .
|
|
"799f2f8de369f7bef568b1560cfdde63cf13745c685fff7d2419a1fd83aeade1698cf87956d6a78e" .
|
|
"2f55482e683c4ea7432ec1b545e365e9e15f676ada98578b166334bcadce4a56cddd2cd85141d5fd" .
|
|
"0e2cdace36b30d613ea1bc2f2aed9cccf4e4536443d334cfb180680eabb73f80c1bd0281803f30fc" .
|
|
"b93951a4dd875d62e5968b0f746d7c51147d5b6abc3e4390e6cf4997005af993dfbec23923e1fae7" .
|
|
"62b47531f2ee510defc9c3700d1a5bb510b2506856160801db79fc78056850a16285145c80edac4e" .
|
|
"3c93ed9f532f067a2303633273b26c340a44ce4e1873107c3da6f9ac616e643ad0aecdcad14a9cff" .
|
|
"d4cf0ae76102818100b82528a3dfc595cf9c6a025998491e3b4849c71aa8d1222ddb14af7f82fbe5" .
|
|
"169ec3ba18ec28d5a9501e95bc9da72cea99e4cdfdf898f40bec6b28f838243d2f39d7226e0873ed" .
|
|
"ee752bcae07639a4bd0eb31be1718c456391630b83ad0e9bf3fa18a645007e64fe59af467ea021f9" .
|
|
"e9a0dd759b21cd0b93333a73116abcaa2a"
|
|
);
|
|
}
|
|
|
|
my $enc_bin;
|
|
|
|
if ($cid == 1)
|
|
{
|
|
my $aes = Crypt::CBC->new ({
|
|
cipher => "Crypt::DES_EDE3",
|
|
key => $key,
|
|
iv => $iv_bin,
|
|
keysize => $key_len,
|
|
literal_key => 1,
|
|
header => "none",
|
|
padding => "standard",
|
|
});
|
|
|
|
$enc_bin = $aes->encrypt ($data_bin);
|
|
}
|
|
else
|
|
{
|
|
my $aes = Crypt::CBC->new ({
|
|
cipher => "Crypt::Rijndael",
|
|
key => $key,
|
|
iv => $iv_bin,
|
|
keysize => $key_len,
|
|
literal_key => 1,
|
|
header => "none",
|
|
padding => "standard",
|
|
});
|
|
|
|
$enc_bin = $aes->encrypt ($data_bin);
|
|
}
|
|
|
|
my $hash = sprintf ('$PEM$1$%d$%s$%d$%s$%d$%s', $cid, unpack ("H*", $salt_bin), $iter, unpack ("H*", $iv_bin), length ($enc_bin), unpack ("H*", $enc_bin));
|
|
|
|
return $hash;
|
|
}
|
|
|
|
sub module_verify_hash
|
|
{
|
|
my $line = shift;
|
|
|
|
my $idx = index ($line, ':');
|
|
|
|
return unless $idx >= 0;
|
|
|
|
my $hash = substr ($line, 0, $idx);
|
|
my $word = substr ($line, $idx + 1);
|
|
|
|
return unless substr ($hash, 0, 6) eq '$PEM$1';
|
|
|
|
my (undef, $signature, $hid, $cid, $salt, $iter, $iv, undef, $data) = split '\$', $hash;
|
|
|
|
return unless defined $signature;
|
|
return unless defined $hid;
|
|
return unless defined $cid;
|
|
return unless defined $salt;
|
|
return unless defined $iter;
|
|
return unless defined $iv;
|
|
return unless defined $data;
|
|
|
|
return unless ($signature eq 'PEM');
|
|
return unless ($hid eq '1');
|
|
|
|
my $word_packed = pack_if_HEX_notation ($word);
|
|
|
|
my $new_hash = module_generate_hash ($word_packed, $salt, $cid, $iter, $iv, $data);
|
|
|
|
return ($new_hash, $word);
|
|
}
|
|
|
|
1;
|