1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-01 13:09:11 +00:00
hashcat/tools/test_modules
2019-12-31 22:04:31 +01:00
..
m00000.pm
m00010.pm
m00011.pm
m00012.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m00020.pm
m00021.pm
m00022.pm Fix several constraints of raw modes 2019-02-16 13:37:17 +01:00
m00023.pm
m00030.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m00040.pm
m00050.pm
m00060.pm
m00100.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m00101.pm
m00110.pm
m00111.pm
m00112.pm Fixed test module constraints 2019-01-03 16:35:41 +01:00
m00120.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m00121.pm
m00122.pm
m00124.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m00125.pm
m00130.pm
m00131.pm
m00132.pm
m00133.pm
m00140.pm
m00141.pm
m00150.pm
m00160.pm
m00200.pm
m00300.pm
m00400.pm
m00500.pm
m00600.pm
m00900.pm
m01000.pm
m01100.pm
m01300.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01400.pm
m01410.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01411.pm
m01420.pm
m01421.pm
m01430.pm
m01440.pm
m01441.pm
m01450.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01460.pm
m01500.pm
m01600.pm
m01700.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01710.pm
m01711.pm
m01720.pm
m01722.pm
m01730.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01731.pm
m01740.pm
m01750.pm
m01760.pm
m01800.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m02100.pm
m02400.pm Mode 2400 and 2410 do not have pure kernel 2019-02-16 14:28:19 +01:00
m02410.pm
m02500.pm
m02600.pm
m02611.pm
m02612.pm
m02711.pm
m02811.pm
m03000.pm
m03100.pm
m03200.pm
m03710.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m03711.pm
m03800.pm
m03910.pm
m04010.pm
m04110.pm
m04300.pm
m04400.pm
m04500.pm
m04520.pm
m04521.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m04522.pm
m04700.pm
m04710.pm fix hash-mode 4710 module_constraints 2019-08-05 13:18:38 +02:00
m04711.pm Added hash-mode 4711, Huawei sha1(md5(pass).salt) 2019-08-03 19:53:23 +02:00
m04800.pm
m04900.pm
m05100.pm
m05300.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m05400.pm
m05500.pm
m05600.pm
m05700.pm
m05800.pm
m06000.pm
m06100.pm
m06300.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m06400.pm
m06500.pm
m06600.pm
m06700.pm
m06800.pm
m06900.pm
m07000.pm
m07100.pm
m07200.pm
m07300.pm
m07400.pm
m07500.pm
m07700.pm
m07701.pm
m07800.pm Add -m 7700, 7701, 7800, 7801 unit tests 2019-02-17 14:55:35 +01:00
m07801.pm Add -m 7700, 7701, 7800, 7801 unit tests 2019-02-17 14:55:35 +01:00
m07900.pm
m08000.pm
m08100.pm
m08200.pm
m08300.pm tests: fix hash generation of -m 8300 = DNSSEC 2019-04-13 19:10:52 +02:00
m08400.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m08500.pm
m08600.pm
m08700.pm
m08900.pm
m09100.pm
m09200.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m09300.pm
m09400.pm
m09500.pm
m09600.pm Do not use next if we mean return 2019-02-19 12:50:57 +01:00
m09700.pm
m09800.pm
m09900.pm
m10000.pm
m10100.pm
m10200.pm
m10300.pm
m10400.pm
m10500.pm
m10600.pm
m10700.pm
m10800.pm
m10900.pm
m11000.pm
m11100.pm
m11200.pm
m11300.pm
m11400.pm
m11500.pm Fixed more constraints in unit tests 2019-02-16 16:04:37 +01:00
m11600.pm
m11700.pm
m11750.pm
m11760.pm
m11800.pm
m11850.pm
m11860.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m11900.pm
m12000.pm
m12001.pm
m12100.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m12200.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m12300.pm
m12400.pm Fixed more constraints in unit tests 2019-02-16 16:04:37 +01:00
m12600.pm
m12700.pm
m12800.pm
m12900.pm
m13000.pm
m13100.pm
m13200.pm
m13300.pm
m13400.pm
m13500.pm
m13600.pm fixes #2200: new WinZip tokenizer hex data length problem 2019-11-09 10:44:28 +01:00
m13800.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m13900.pm
m14000.pm Fixed more constraints in unit tests 2019-02-16 16:04:37 +01:00
m14100.pm
m14400.pm
m14700.pm
m14800.pm
m14900.pm
m15000.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m15100.pm
m15200.pm
m15300.pm
m15400.pm Fix -m 15400 selftest-pair, benchmark-mask and unit-test 2019-11-21 09:39:07 +01:00
m15500.pm
m15600.pm
m15700.pm
m15900.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m16000.pm
m16100.pm
m16200.pm
m16300.pm
m16400.pm
m16500.pm
m16600.pm
m16700.pm
m16800.pm Fix -m 16800 unit test 2019-04-03 10:46:50 +02:00
m16900.pm
m17300.pm
m17400.pm
m17500.pm
m17600.pm Fixed more constraints in unit tests 2019-02-16 16:04:37 +01:00
m17700.pm Fixed more constraints in unit tests 2019-02-16 16:04:37 +01:00
m17800.pm
m17900.pm
m18000.pm Fixed more constraints in unit tests 2019-02-16 16:04:37 +01:00
m18100.pm
m18200.pm
m18300.pm
m18400.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m18500.pm
m18600.pm
m18700.pm
m18800.pm
m18900.pm
m19000.pm Added QNX /etc/shadow hash cracking support 2019-02-27 17:53:00 +01:00
m19100.pm
m19200.pm Added QNX /etc/shadow hash cracking support 2019-02-27 17:53:00 +01:00
m19300.pm
m19500.pm Added hash mode 19500 2019-03-06 21:15:09 +01:00
m19600.pm Add hash modes 19600 (krb5tgs enctype 17) and 19700 (krb5tgs enctype 18) 2019-03-13 17:20:04 +01:00
m19700.pm m19700 test cases: remove debug strings 2019-03-13 22:22:54 +01:00
m19800.pm Test module variable scope fix 2019-04-16 09:58:28 -07:00
m19900.pm Test module variable scope fix 2019-04-16 09:58:28 -07:00
m20011.pm Move 198xx DiskCryptor to 200xx to not collide with Kerberos 5, etype 17, Pre-Auth 2019-04-20 19:41:37 +02:00
m20012.pm Move 198xx DiskCryptor to 200xx to not collide with Kerberos 5, etype 17, Pre-Auth 2019-04-20 19:41:37 +02:00
m20013.pm Move 198xx DiskCryptor to 200xx to not collide with Kerberos 5, etype 17, Pre-Auth 2019-04-20 19:41:37 +02:00
m20200.pm Change hash mode of addition, add test module 2019-05-02 22:36:23 +02:00
m20300.pm Added support for passlib pbkdf2-sha256 and sha1 2019-05-08 09:24:12 +02:00
m20400.pm Added support for passlib pbkdf2-sha256 and sha1 2019-05-08 09:24:12 +02:00
m20500.pm adding pkzip stream cipher kernels 20500 and 20510 2019-05-17 14:11:22 +02:00
m20510.pm Add minimum password length for -m 20510 2019-05-18 16:29:58 +02:00
m20600.pm update constraints for m20600 test module 2019-06-19 08:12:25 -05:00
m20710.pm update AuthMe patch (3) 2019-08-03 02:37:43 +02:00
m20711.pm update AuthMe patch (3) 2019-08-03 02:37:43 +02:00
m20800.pm switch hash-mode from 4710 to 20800 2019-07-30 14:44:17 +02:00
m20900.pm switch hash-mode from 4410 to 20900 2019-07-30 15:08:55 +02:00
m21000.pm switch hash-mode from 1770 to 21000 2019-07-30 15:15:49 +02:00
m21100.pm switch hash-mode from 4720 to 21100 2019-07-30 15:19:22 +02:00
m21200.pm switch hash-mode from 4420 to 21200 2019-07-30 15:23:04 +02:00
m21300.pm switch hash-mode from 4430 to 21300 2019-07-30 15:26:07 +02:00
m21400.pm switch hash-mode from 1470 to 21400, cleanup credits/readme/changes txt 2019-07-31 15:39:16 +02:00
m21500.pm Fix some code in -m 21500 2019-08-08 10:47:09 +02:00
m21600.pm Fix -m 21600 default hash length 2019-11-27 09:03:17 +01:00
m21700.pm Added -m 21700 = Electrum 4 and -m 21800 = Electrum 5 2019-11-16 10:48:52 +01:00
m21800.pm tests: allow tests with 05 AND 04 in zlib header for electrum 5 2019-12-11 15:45:47 +01:00
m22000.pm Initial -m 22001 support 2019-12-19 22:14:42 +01:00
m22100.pm Update Bitlocker minimum password length 4 2019-12-31 22:04:31 +01:00
README.md

Hashcat test modules

Each module provides the functions module_constraints, module_generate_hash and module_verify_hash.

  • The module_constraints function should return the minimum and maximum length of the password, salt and the combination of password and salt in following order: password (pure), salt (pure), password (optimized), salt (optimized) and combination (optimized). Each pair should be set to -1 if the hash mode is not supporting the appropriate field. For example, if a hash-mode does not support a salt, it should be set to -1. The last field (combination) is important if the the password and the salt is stored in the same buffer in the kernel (typically raw hashes only).
  • The first parameter to module_generate_hash is the password, which can be either in ASCII or binary (packed) form. The second parameter is the salt *which can be undefined for unsalted hash modes).
  • The module_verify_hash function accepts a line from the cracks file, without the newline characters.

During single and passthrough tests the module_generate_hash function must provide random values (e.g. salt) for hash generation if necessary. The test.pl script offers a few handy functions like random_hex_string, random_numeric_string and random_bytes. You can implement your own salt generation functions, if your mode has specific requirements.

During verify tests the module_verify_hash function must parse the hash:password line and calculate a hash by passing all necessary data to module_generate_hash. How you pass it is up to you, as long as the first parameter is the password.

Important: You have to call pack_if_HEX_notation as soon as you have parsed the password, or your tests will fail on passwords in the $HEX[...] format.

If the algorithm has ambiguous hashes (e.g. partial case-insensetivity), the test module can provide an optional function module_preprocess_hashlist. It recieves a reference to the hashlist array and can unify the hashes in a way that guarantees the match with the output of module_verify_hash.

Examples

  • For the most basic test modules, see m00000.pm and m00100.pm
  • For the basic salted hash tests, see m00110.pm and m00120.pm
  • For some sligthly more complex modules with PBKDF2 and encryption, see m18400.pm and m18600.pm
  • For a test module with hashlist preprocessing and a custom salt generation algorithm, see m05600.pm