mirror of
https://github.com/hashcat/hashcat.git
synced 2024-11-15 20:39:17 +00:00
391 lines
17 KiB
C
391 lines
17 KiB
C
/**
|
|
* Author......: See docs/credits.txt
|
|
* License.....: MIT
|
|
*/
|
|
|
|
#include "common.h"
|
|
#include "types.h"
|
|
#include "modules.h"
|
|
#include "bitops.h"
|
|
#include "convert.h"
|
|
#include "shared.h"
|
|
#include "memory.h"
|
|
|
|
static const u32 ATTACK_EXEC = ATTACK_EXEC_INSIDE_KERNEL;
|
|
static const u32 DGST_POS0 = 0;
|
|
static const u32 DGST_POS1 = 1;
|
|
static const u32 DGST_POS2 = 2;
|
|
static const u32 DGST_POS3 = 3;
|
|
static const u32 DGST_SIZE = DGST_SIZE_4_5;
|
|
static const u32 HASH_CATEGORY = HASH_CATEGORY_CRYPTOCURRENCY_WALLET;
|
|
static const char *HASH_NAME = "Bitcoin WIF private key (P2WSH, Bech32), uncompressed";
|
|
static const u64 KERN_TYPE = 28502;
|
|
static const u32 OPTI_TYPE = OPTI_TYPE_NOT_SALTED;
|
|
static const u64 OPTS_TYPE = OPTS_TYPE_STOCK_MODULE
|
|
| OPTS_TYPE_PT_GENERATE_LE;
|
|
static const u32 SALT_TYPE = SALT_TYPE_NONE;
|
|
static const char *ST_PASS = "5HzV19ffW9QTnmZHbwETRpPHm1d4hAP8PG1etUb3T3jjhashcat";
|
|
static const char *ST_HASH = "bc1qv8e65p73gmp4w3z6fqnyu8t6ct69vetsda3snd";
|
|
static const char *BENCHMARK_MASK = "?b?b?b?b?b?b?bfW9QTnmZHbwETRpPHm1d4hAP8PG1etUb3T3jjhashcat";
|
|
static const u32 WIF_LEN = 51;
|
|
|
|
u32 module_attack_exec (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ATTACK_EXEC; }
|
|
u32 module_dgst_pos0 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS0; }
|
|
u32 module_dgst_pos1 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS1; }
|
|
u32 module_dgst_pos2 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS2; }
|
|
u32 module_dgst_pos3 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS3; }
|
|
u32 module_dgst_size (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_SIZE; }
|
|
u32 module_hash_category (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return HASH_CATEGORY; }
|
|
const char *module_hash_name (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return HASH_NAME; }
|
|
u64 module_kern_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return KERN_TYPE; }
|
|
u32 module_opti_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return OPTI_TYPE; }
|
|
u64 module_opts_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return OPTS_TYPE; }
|
|
u32 module_salt_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return SALT_TYPE; }
|
|
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
|
|
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
|
|
const char *module_benchmark_mask (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return BENCHMARK_MASK; }
|
|
|
|
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
|
{
|
|
return WIF_LEN;
|
|
}
|
|
|
|
u32 module_pw_min (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
|
{
|
|
return WIF_LEN;
|
|
}
|
|
|
|
static u32 polymod_checksum (const u8 *data, const u32 data_len)
|
|
{
|
|
const u32 CONST[5] = { 0x3b6a57b2, 0x26508e6d, 0x1ea119fa, 0x3d4233dd, 0x2a1462b3 };
|
|
|
|
u32 c = 1;
|
|
|
|
for (u32 i = 0; i < data_len; i++) // data_len is always 44 for us
|
|
{
|
|
const u32 b = c >> 25;
|
|
|
|
c = ((c & 0x01ffffff) << 5) ^ data[i];
|
|
|
|
for (u32 j = 0; j < 5; j++)
|
|
{
|
|
const u32 bit_set = (b >> j) & 1;
|
|
|
|
if (bit_set == 0) continue;
|
|
|
|
c ^= CONST[j];
|
|
}
|
|
}
|
|
|
|
return c;
|
|
}
|
|
|
|
static const char *SIGNATURE_BITCOIN_BECH32 = "bc1"; // human readable part (HRP) + "1"
|
|
static const char *BECH32_BASE32_ALPHABET = "qpzry9x8gf2tvdw0s3jn54khce6mua7l";
|
|
|
|
int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED void *digest_buf, MAYBE_UNUSED salt_t *salt, MAYBE_UNUSED void *esalt_buf, MAYBE_UNUSED void *hook_salt_buf, MAYBE_UNUSED hashinfo_t *hash_info, const char *line_buf, MAYBE_UNUSED const int line_len)
|
|
{
|
|
u32 *digest = (u32 *) digest_buf;
|
|
|
|
hc_token_t token;
|
|
|
|
token.token_cnt = 2;
|
|
|
|
token.signatures_cnt = 1;
|
|
token.signatures_buf[0] = SIGNATURE_BITCOIN_BECH32;
|
|
|
|
token.len[0] = 3;
|
|
token.attr[0] = TOKEN_ATTR_FIXED_LENGTH
|
|
| TOKEN_ATTR_VERIFY_SIGNATURE;
|
|
|
|
token.len[1] = 39; // 42 - 3 (SIGNATURE_BITCOIN_BECH32)
|
|
token.attr[1] = TOKEN_ATTR_FIXED_LENGTH
|
|
| TOKEN_ATTR_VERIFY_BECH32;
|
|
|
|
const int rc_tokenizer = input_tokenizer ((const u8 *) line_buf, line_len, &token); if (rc_tokenizer != PARSER_OK) return (rc_tokenizer);
|
|
|
|
// Bech32 decode:
|
|
|
|
u8 t[64] = { 0 }; // only 42 - 3 = 39 needed
|
|
|
|
for (u32 i = 3; i < 42; i++) // skip first 3 bytes ("bc1")
|
|
{
|
|
// this is actually a search that we could do also with strstr ():
|
|
// note: we always have a hit, because we verified this with TOKEN_ATTR_VERIFY_BECH32
|
|
|
|
for (u32 j = 0; j < 32; j++)
|
|
{
|
|
if (BECH32_BASE32_ALPHABET[j] == line_buf[i])
|
|
{
|
|
t[i - 3] = j;
|
|
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (t[0] != 0) // check if "version"/type is BECH32, we do NOT accept BECH32M
|
|
{
|
|
return (PARSER_HASH_ENCODING);
|
|
}
|
|
|
|
/*
|
|
* Check the checksum of the address:
|
|
*/
|
|
|
|
u32 checksum = t[33] << 25
|
|
| t[34] << 20
|
|
| t[35] << 15
|
|
| t[36] << 10
|
|
| t[37] << 5
|
|
| t[38] << 0;
|
|
|
|
u8 data[64] = { 0 }; // only 44 bytes actually needed
|
|
|
|
data[0] = 3; // HRP = Human Readable Part, 3 base32 chars => 5 bytes prefix
|
|
data[1] = 3; // these 5 bytes come from: hrp_expand ("bc"), human readable part
|
|
data[2] = 0;
|
|
data[3] = 2;
|
|
data[4] = 3;
|
|
|
|
for (u32 i = 0; i < 42 - 3 - 6; i++) // skip "bc1" (start) and checksum (end)
|
|
{
|
|
data[i + 5] = t[i];
|
|
}
|
|
|
|
data[38] = 0; // "clear" the 6 checksum bytes (for correct "polymod" checksum below)
|
|
data[39] = 0;
|
|
data[40] = 0;
|
|
data[41] = 0;
|
|
data[42] = 0;
|
|
data[43] = 0;
|
|
|
|
u32 polymod = polymod_checksum (data, 44) ^ 1; // BECH32M would xor with 0x2bc830a3
|
|
|
|
if (polymod != checksum) // or (polymod_checksum (data, 44) ^ checksum) != 1
|
|
{
|
|
return (PARSER_HASH_ENCODING);
|
|
}
|
|
|
|
|
|
/*
|
|
* transform/convert back to the ripemd hash (reverse translate_8to5 (), i.e. translate_5to8).
|
|
* We extend the 8 bit blocks here to 32 bit blocks (4 * 8 = 32 bits), therefore we convert
|
|
* 5 bit "blocks" to 32 bit blocks (from the base32 range: 0..31 to u32: 0..0xffffffff):
|
|
*/
|
|
|
|
// note: t[0] needs to be skipped (version info)
|
|
|
|
digest[0] = (t[ 1] << 27) | (t[ 2] << 22) | (t[ 3] << 17) | (t[ 4] << 12)
|
|
| (t[ 5] << 7) | (t[ 6] << 2) | (t[ 7] >> 3);
|
|
|
|
digest[1] = (t[ 7] << 29) | (t[ 8] << 24) | (t[ 9] << 19) | (t[10] << 14)
|
|
| (t[11] << 9) | (t[12] << 4) | (t[13] >> 1);
|
|
|
|
digest[2] = (t[13] << 31) | (t[14] << 26) | (t[15] << 21) | (t[16] << 16)
|
|
| (t[17] << 11) | (t[18] << 6) | (t[19] << 1) | (t[20] >> 4);
|
|
|
|
digest[3] = (t[20] << 28) | (t[21] << 23) | (t[22] << 18) | (t[23] << 13)
|
|
| (t[24] << 8) | (t[25] << 3) | (t[26] >> 2);
|
|
|
|
digest[4] = (t[26] << 30) | (t[27] << 25) | (t[28] << 20) | (t[29] << 15)
|
|
| (t[30] << 10) | (t[31] << 5) | (t[32] << 0);
|
|
|
|
// a final byte swap is needed for the kernel code:
|
|
|
|
for (u32 i = 0; i < 5; i++)
|
|
{
|
|
digest[i] = byte_swap_32 (digest[i]);
|
|
}
|
|
|
|
return (PARSER_OK);
|
|
}
|
|
|
|
int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const void *digest_buf, MAYBE_UNUSED const salt_t *salt, MAYBE_UNUSED const void *esalt_buf, MAYBE_UNUSED const void *hook_salt_buf, MAYBE_UNUSED const hashinfo_t *hash_info, char *line_buf, MAYBE_UNUSED const int line_size)
|
|
{
|
|
// note: here we work mostly with char/u8 type because it's easier to base32 encode
|
|
// (at least conceptually), but this could be easily extended to u32 variable types:
|
|
|
|
u8 *digest = (u8 *) digest_buf;
|
|
|
|
u8 b[20] = { 0 };
|
|
|
|
for (u32 i = 0; i < 20; i++) // i < length (digest)
|
|
{
|
|
b[i] = digest[i];
|
|
}
|
|
|
|
|
|
/*
|
|
* convert 8 bit "blocks" to 5 bit blocks, translate_8to5 () (for base32, 0..31):
|
|
*/
|
|
|
|
u8 t[64] = { 0 }; // only 39 bytes actually needed
|
|
|
|
t[ 0] = 0; // set "version"/type to BECH32, we do NOT support BECH32M
|
|
|
|
t[ 1] = ( (b[ 0] >> 3)) & 31;
|
|
t[ 2] = ((b[ 0] << 2) | (b[ 1] >> 6)) & 31;
|
|
t[ 3] = ( (b[ 1] >> 1)) & 31;
|
|
t[ 4] = ((b[ 1] << 4) | (b[ 2] >> 4)) & 31;
|
|
t[ 5] = ((b[ 2] << 1) | (b[ 3] >> 7)) & 31;
|
|
t[ 6] = ( (b[ 3] >> 2)) & 31;
|
|
t[ 7] = ((b[ 3] << 3) | (b[ 4] >> 5)) & 31;
|
|
t[ 8] = ( (b[ 4] >> 0)) & 31;
|
|
|
|
t[ 9] = ( (b[ 5] >> 3)) & 31;
|
|
t[10] = ((b[ 5] << 2) | (b[ 6] >> 6)) & 31;
|
|
t[11] = ( (b[ 6] >> 1)) & 31;
|
|
t[12] = ((b[ 6] << 4) | (b[ 7] >> 4)) & 31;
|
|
t[13] = ((b[ 7] << 1) | (b[ 8] >> 7)) & 31;
|
|
t[14] = ( (b[ 8] >> 2)) & 31;
|
|
t[15] = ((b[ 8] << 3) | (b[ 9] >> 5)) & 31;
|
|
t[16] = ( (b[ 9] >> 0)) & 31;
|
|
|
|
t[17] = ( (b[10] >> 3)) & 31;
|
|
t[18] = ((b[10] << 2) | (b[11] >> 6)) & 31;
|
|
t[19] = ( (b[11] >> 1)) & 31;
|
|
t[20] = ((b[11] << 4) | (b[12] >> 4)) & 31;
|
|
t[21] = ((b[12] << 1) | (b[13] >> 7)) & 31;
|
|
t[22] = ( (b[13] >> 2)) & 31;
|
|
t[23] = ((b[13] << 3) | (b[14] >> 5)) & 31;
|
|
t[24] = ( (b[14] >> 0)) & 31;
|
|
|
|
t[25] = ( (b[15] >> 3)) & 31;
|
|
t[26] = ((b[15] << 2) | (b[16] >> 6)) & 31;
|
|
t[27] = ( (b[16] >> 1)) & 31;
|
|
t[28] = ((b[16] << 4) | (b[17] >> 4)) & 31;
|
|
t[29] = ((b[17] << 1) | (b[18] >> 7)) & 31;
|
|
t[30] = ( (b[18] >> 2)) & 31;
|
|
t[31] = ((b[18] << 3) | (b[19] >> 5)) & 31;
|
|
t[32] = ( (b[19] >> 0)) & 31;
|
|
|
|
// note: some further t[] array items will be set after we know the checksum of this part
|
|
|
|
|
|
/*
|
|
* Checksum:
|
|
*/
|
|
|
|
u8 data[64] = { 0 }; // only 44 bytes actually needed
|
|
|
|
data[0] = 3; // hrp_expand ("bc"), human readable part
|
|
data[1] = 3;
|
|
data[2] = 0;
|
|
data[3] = 2;
|
|
data[4] = 3;
|
|
|
|
for (u32 i = 0; i < 33; i++)
|
|
{
|
|
data[i + 5] = t[i];
|
|
}
|
|
|
|
// data[38] = data[39] = data[40] = data[41] = data[42] = data[43] = 0;
|
|
|
|
u32 polymod = polymod_checksum (data, 44) ^ 1; // BECH32M would xor with 0x2bc830a3
|
|
|
|
t[33] = (polymod >> 25) & 31;
|
|
t[34] = (polymod >> 20) & 31;
|
|
t[35] = (polymod >> 15) & 31;
|
|
t[36] = (polymod >> 10) & 31;
|
|
t[37] = (polymod >> 5) & 31;
|
|
t[38] = (polymod >> 0) & 31;
|
|
|
|
|
|
/*
|
|
* BASE32 encode:
|
|
*/
|
|
|
|
u8 bech32_address[64] = { 0 }; // only 39 bytes needed: 1 + 32 + 6
|
|
|
|
for (u32 i = 0; i < 39; i++)
|
|
{
|
|
const u32 idx = t[i];
|
|
|
|
bech32_address[i] = BECH32_BASE32_ALPHABET[idx];
|
|
}
|
|
|
|
bech32_address[39] = 0; // be extra safe, terminate the "C" string with NUL byte
|
|
|
|
return snprintf (line_buf, line_size, "%s%s", SIGNATURE_BITCOIN_BECH32, bech32_address);
|
|
}
|
|
|
|
void module_init (module_ctx_t *module_ctx)
|
|
{
|
|
module_ctx->module_context_size = MODULE_CONTEXT_SIZE_CURRENT;
|
|
module_ctx->module_interface_version = MODULE_INTERFACE_VERSION_CURRENT;
|
|
|
|
module_ctx->module_attack_exec = module_attack_exec;
|
|
module_ctx->module_benchmark_esalt = MODULE_DEFAULT;
|
|
module_ctx->module_benchmark_hook_salt = MODULE_DEFAULT;
|
|
module_ctx->module_benchmark_mask = module_benchmark_mask;
|
|
module_ctx->module_benchmark_salt = MODULE_DEFAULT;
|
|
module_ctx->module_build_plain_postprocess = MODULE_DEFAULT;
|
|
module_ctx->module_deep_comp_kernel = MODULE_DEFAULT;
|
|
module_ctx->module_deprecated_notice = MODULE_DEFAULT;
|
|
module_ctx->module_dgst_pos0 = module_dgst_pos0;
|
|
module_ctx->module_dgst_pos1 = module_dgst_pos1;
|
|
module_ctx->module_dgst_pos2 = module_dgst_pos2;
|
|
module_ctx->module_dgst_pos3 = module_dgst_pos3;
|
|
module_ctx->module_dgst_size = module_dgst_size;
|
|
module_ctx->module_dictstat_disable = MODULE_DEFAULT;
|
|
module_ctx->module_esalt_size = MODULE_DEFAULT;
|
|
module_ctx->module_extra_buffer_size = MODULE_DEFAULT;
|
|
module_ctx->module_extra_tmp_size = MODULE_DEFAULT;
|
|
module_ctx->module_extra_tuningdb_block = MODULE_DEFAULT;
|
|
module_ctx->module_forced_outfile_format = MODULE_DEFAULT;
|
|
module_ctx->module_hash_binary_count = MODULE_DEFAULT;
|
|
module_ctx->module_hash_binary_parse = MODULE_DEFAULT;
|
|
module_ctx->module_hash_binary_save = MODULE_DEFAULT;
|
|
module_ctx->module_hash_decode_postprocess = MODULE_DEFAULT;
|
|
module_ctx->module_hash_decode_potfile = MODULE_DEFAULT;
|
|
module_ctx->module_hash_decode_zero_hash = MODULE_DEFAULT;
|
|
module_ctx->module_hash_decode = module_hash_decode;
|
|
module_ctx->module_hash_encode_status = MODULE_DEFAULT;
|
|
module_ctx->module_hash_encode_potfile = MODULE_DEFAULT;
|
|
module_ctx->module_hash_encode = module_hash_encode;
|
|
module_ctx->module_hash_init_selftest = MODULE_DEFAULT;
|
|
module_ctx->module_hash_mode = MODULE_DEFAULT;
|
|
module_ctx->module_hash_category = module_hash_category;
|
|
module_ctx->module_hash_name = module_hash_name;
|
|
module_ctx->module_hashes_count_min = MODULE_DEFAULT;
|
|
module_ctx->module_hashes_count_max = MODULE_DEFAULT;
|
|
module_ctx->module_hlfmt_disable = MODULE_DEFAULT;
|
|
module_ctx->module_hook_extra_param_size = MODULE_DEFAULT;
|
|
module_ctx->module_hook_extra_param_init = MODULE_DEFAULT;
|
|
module_ctx->module_hook_extra_param_term = MODULE_DEFAULT;
|
|
module_ctx->module_hook12 = MODULE_DEFAULT;
|
|
module_ctx->module_hook23 = MODULE_DEFAULT;
|
|
module_ctx->module_hook_salt_size = MODULE_DEFAULT;
|
|
module_ctx->module_hook_size = MODULE_DEFAULT;
|
|
module_ctx->module_jit_build_options = MODULE_DEFAULT;
|
|
module_ctx->module_jit_cache_disable = MODULE_DEFAULT;
|
|
module_ctx->module_kernel_accel_max = MODULE_DEFAULT;
|
|
module_ctx->module_kernel_accel_min = MODULE_DEFAULT;
|
|
module_ctx->module_kernel_loops_max = MODULE_DEFAULT;
|
|
module_ctx->module_kernel_loops_min = MODULE_DEFAULT;
|
|
module_ctx->module_kernel_threads_max = MODULE_DEFAULT;
|
|
module_ctx->module_kernel_threads_min = MODULE_DEFAULT;
|
|
module_ctx->module_kern_type = module_kern_type;
|
|
module_ctx->module_kern_type_dynamic = MODULE_DEFAULT;
|
|
module_ctx->module_opti_type = module_opti_type;
|
|
module_ctx->module_opts_type = module_opts_type;
|
|
module_ctx->module_outfile_check_disable = MODULE_DEFAULT;
|
|
module_ctx->module_outfile_check_nocomp = MODULE_DEFAULT;
|
|
module_ctx->module_potfile_custom_check = MODULE_DEFAULT;
|
|
module_ctx->module_potfile_disable = MODULE_DEFAULT;
|
|
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
|
|
module_ctx->module_pwdump_column = MODULE_DEFAULT;
|
|
module_ctx->module_pw_max = module_pw_max;
|
|
module_ctx->module_pw_min = module_pw_min;
|
|
module_ctx->module_salt_max = MODULE_DEFAULT;
|
|
module_ctx->module_salt_min = MODULE_DEFAULT;
|
|
module_ctx->module_salt_type = module_salt_type;
|
|
module_ctx->module_separator = MODULE_DEFAULT;
|
|
module_ctx->module_st_hash = module_st_hash;
|
|
module_ctx->module_st_pass = module_st_pass;
|
|
module_ctx->module_tmp_size = MODULE_DEFAULT;
|
|
module_ctx->module_unstable_warning = MODULE_DEFAULT;
|
|
module_ctx->module_warmup_disable = MODULE_DEFAULT;
|
|
}
|