mirror of
https://github.com/hashcat/hashcat.git
synced 2024-11-25 01:18:15 +00:00
66 lines
1.2 KiB
Perl
66 lines
1.2 KiB
Perl
#!/usr/bin/env perl
|
|
|
|
##
|
|
## Author......: See docs/credits.txt
|
|
## License.....: MIT
|
|
##
|
|
|
|
use strict;
|
|
use warnings;
|
|
|
|
use Crypt::UnixCrypt_XS qw (crypt_rounds fold_password base64_to_int24 block_to_base64 int24_to_base64);
|
|
|
|
sub module_constraints { [[1, 31], [4, 4], [-1, -1], [-1, -1], [-1, -1]] }
|
|
|
|
sub module_generate_hash
|
|
{
|
|
my $word = shift;
|
|
my $salt = shift;
|
|
my $iter = shift // random_number (1, 5000);
|
|
|
|
my $key_value = fold_password ($word);
|
|
|
|
my $data = "\x00\x00\x00\x00\x00\x00\x00\x00";
|
|
|
|
my $salt_value = base64_to_int24 ($salt);
|
|
|
|
my $hash_buf = crypt_rounds ($key_value, $iter, $salt_value, $data);
|
|
|
|
my $tmp_hash = sprintf ("_%s%s%s", int24_to_base64 ($iter), $salt, block_to_base64 ($hash_buf));
|
|
|
|
return $tmp_hash;
|
|
}
|
|
|
|
sub module_verify_hash
|
|
{
|
|
my $line = shift;
|
|
|
|
return unless (substr ($line, 0, 1) eq '_');
|
|
|
|
my $index1 = index ($line, ':', 20);
|
|
|
|
return if ($index1 != 20);
|
|
|
|
# iter
|
|
|
|
my $iter = substr ($line, 1, 4);
|
|
|
|
$iter = base64_to_int24 ($iter);
|
|
|
|
# salt
|
|
|
|
my $salt = substr ($line, 5, 4);
|
|
|
|
# word / hash
|
|
|
|
my $word = substr ($line, $index1 + 1);
|
|
|
|
my $word_packed = pack_if_HEX_notation ($word);
|
|
|
|
my $new_hash = module_generate_hash ($word_packed, $salt, $iter);
|
|
|
|
return ($new_hash, $word);
|
|
}
|
|
|
|
1;
|