mirror of
https://github.com/hashcat/hashcat.git
synced 2024-12-23 07:08:19 +00:00
6365672c34
Some algorithms have ambiguous hashes (e.g. case-insensetive usernames in Net-NTLMv2 hashes). This optional function allows test modules to unify the hashlist before the verification process starts. Also update readme and minor code formatting.
107 lines
2.4 KiB
Perl
107 lines
2.4 KiB
Perl
#!/usr/bin/env perl
|
|
|
|
##
|
|
## Author......: See docs/credits.txt
|
|
## License.....: MIT
|
|
##
|
|
|
|
use strict;
|
|
|
|
use Authen::Passphrase::NTHash;
|
|
use Digest::HMAC qw (hmac hmac_hex);
|
|
use Digest::MD5 qw (md5);
|
|
use Encode qw (encode);
|
|
|
|
sub module_generate_hash
|
|
{
|
|
my $word = shift;
|
|
|
|
my $user_len = random_number (0, 27);
|
|
my $domain_len = 27 - $user_len;
|
|
|
|
my $user = shift // random_string ($user_len);
|
|
my $domain = shift // random_string ($domain_len);
|
|
my $srv_ch = shift // random_hex_string (2*8);
|
|
my $cli_ch = shift // random_client_challenge ();
|
|
|
|
my $b_srv_ch = pack ('H*', $srv_ch);
|
|
my $b_cli_ch = pack ('H*', $cli_ch);
|
|
|
|
my $nthash = Authen::Passphrase::NTHash->new (passphrase => $word)->hash;
|
|
my $identity = encode ('UTF-16LE', uc ($user) . $domain);
|
|
my $hash_buf = hmac_hex ($b_srv_ch . $b_cli_ch, hmac ($identity, $nthash, \&md5, 64), \&md5, 64);
|
|
|
|
my $hash = sprintf ("%s::%s:%s:%s:%s", $user, $domain, $srv_ch, $hash_buf, $cli_ch);
|
|
|
|
return $hash;
|
|
}
|
|
|
|
sub module_verify_hash
|
|
{
|
|
my $line = shift;
|
|
|
|
my $user;
|
|
my $domain;
|
|
my $srv_ch;
|
|
my $cli_ch;
|
|
my $word;
|
|
|
|
my $hash;
|
|
|
|
my $index1 = index ($line, '::');
|
|
my $index2 = index ($line, ':', $index1 + 2);
|
|
my $index3 = index ($line, ':', $index2 + 3 + 16 + 32);
|
|
|
|
return if $index1 eq -1;
|
|
return if $index2 eq -1;
|
|
return if $index3 eq -1;
|
|
|
|
$hash = substr ($line, 0, $index3);
|
|
|
|
$user = substr ($line, 0, $index1);
|
|
$domain = substr ($line, $index1 + 2, $index2 - $index1 - 2);
|
|
$srv_ch = substr ($line, $index2 + 1, 16);
|
|
$cli_ch = substr ($line, $index2 + 3 + 16 + 32, $index3 - $index2 - 3 - 16 - 32);
|
|
$word = substr ($line, $index3 + 1);
|
|
|
|
$word = pack_if_HEX_notation ($word);
|
|
|
|
my $new_hash = module_generate_hash ($word, $user, $domain, $srv_ch, $cli_ch);
|
|
|
|
# resolve lowercase/uppercase ambiguity in the username
|
|
# this will also guarantee a match with the preprocessed hashlist
|
|
$hash = lc $hash;
|
|
$new_hash = lc $new_hash;
|
|
|
|
return unless $new_hash eq $hash;
|
|
|
|
return $new_hash;
|
|
}
|
|
|
|
# algorithm is case-insensitive in regard to usernames
|
|
# hashcat output always is uppercase, while real world hashes are not
|
|
sub module_preprocess_hashlist
|
|
{
|
|
my $hashlist = shift;
|
|
|
|
for my $hash (@{$hashlist})
|
|
{
|
|
$hash = lc $hash;
|
|
}
|
|
}
|
|
|
|
sub random_client_challenge
|
|
{
|
|
my $ch;
|
|
|
|
$ch .= '0101000000000000';
|
|
$ch .= random_hex_string (2*16);
|
|
$ch .= '00000000';
|
|
$ch .= random_hex_string(2 * random_count (20));
|
|
$ch .= '00';
|
|
|
|
return $ch;
|
|
}
|
|
|
|
1;
|