1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-02 05:30:19 +00:00
hashcat/tools/test_modules
2018-12-21 09:53:41 +01:00
..
m00000.pm Update other modules just for consistency 2018-12-21 09:53:41 +01:00
m00100.pm Update other modules just for consistency 2018-12-21 09:53:41 +01:00
m00110.pm Update other modules just for consistency 2018-12-21 09:53:41 +01:00
m00120.pm Update other modules just for consistency 2018-12-21 09:53:41 +01:00
m01000.pm Add functionality in test.pl to allow empty hash returns. This is required to enable hash-mode depending password length checks. NTLM supports just 27 characters in optimized mode, but single mode would produce 32, resulting in a non found password 2018-12-21 09:48:51 +01:00
m18400.pm Update other modules just for consistency 2018-12-21 09:53:41 +01:00
m18600.pm Update other modules just for consistency 2018-12-21 09:53:41 +01:00
README.md Add test modules 2018-12-20 19:18:06 +01:00

Hashcat test modules

Each module provides the two functions module_generate_hash and module_verify_hash. The first parameter to module_generate_hash is the password, which can be either in ASCII or binary (packed) form. The module_verify_hash function accepts a line from the cracks file, without the newline characters.

During single and passthrough tests the module_generate_hash function must provide random values (e.g. salt) for hash generation if necessary. The test.pl script offers a few handy functions like random_hex_string, random_numeric_string and random_bytes. You can implement your own salt generation functions, if your mode has specific requirements.

During verify tests the module_verify_hash function must parse the hash:password line and to calculate a hash by passing all necessary data to module_generate_hash. How you pass it is up to you, as long as the first parameter is the password.

Important: You have to call pack_if_HEX_notation as soon as you have parsed the password, or your tests will fail on passwords in the $HEX[...] format.

Examples