1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-15 20:39:17 +00:00
hashcat/tools/test_modules
Jens Steube 93427cab23
Merge pull request #3352 from philsmd/bitcoin_compat_address
Add -m 28505/28506, Bitcoin WIF, P2SH(P2WPKH)/compat address
2022-07-08 20:42:07 +02:00
..
m00000.pm
m00010.pm
m00011.pm
m00012.pm
m00020.pm
m00021.pm
m00022.pm Fixed Unit Test salt-max in case of optimized kernel, with hash-type 22 and 23 2022-01-15 16:27:15 +01:00
m00023.pm
m00024.pm
m00030.pm
m00040.pm
m00050.pm
m00060.pm tests: cleanup and module deps fix 2022-01-30 10:35:51 +01:00
m00070.pm
m00100.pm
m00101.pm
m00110.pm
m00111.pm
m00112.pm
m00120.pm
m00121.pm
m00122.pm
m00124.pm
m00125.pm
m00130.pm
m00131.pm
m00132.pm
m00133.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m00140.pm
m00141.pm
m00150.pm
m00160.pm
m00170.pm
m00200.pm Make use of module_constraints more easy and fix some modes 2018-12-29 16:23:29 +01:00
m00300.pm
m00400.pm
m00500.pm
m00600.pm updates default pw_max length for blake2b 2020-06-27 12:48:36 +02:00
m00610.pm
m00620.pm
m00900.pm
m01000.pm Example of a better UTF8 to UTF16LE encoding in unit test. It allows digesting UTF8 encoded password candidates from the shell in passthrough mode 2021-05-01 12:22:07 +02:00
m01100.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01300.pm
m01400.pm
m01410.pm
m01411.pm
m01420.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01421.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01430.pm
m01440.pm
m01441.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01450.pm
m01460.pm
m01470.pm Added hash-mode 1470 - sha256(utf16le(pass)) 2020-12-16 22:22:20 +01:00
m01500.pm
m01600.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01700.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01710.pm
m01711.pm
m01720.pm
m01722.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01730.pm
m01731.pm
m01740.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m01750.pm
m01760.pm
m01770.pm
m01800.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m02100.pm
m02400.pm tests: cleanup and module deps fix 2022-01-30 10:35:51 +01:00
m02410.pm
m02500.pm Fixed more constraints in unit tests 2019-02-16 16:04:37 +01:00
m02600.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m02611.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m02612.pm
m02711.pm
m02811.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m03000.pm Prevent unit test of -m 3000 to generate zero hash. This confuses test.sh validator 2021-04-26 09:32:19 +02:00
m03100.pm
m03200.pm Fixed more constraints in unit tests 2019-02-16 16:04:37 +01:00
m03500.pm
m03710.pm
m03711.pm
m03800.pm
m03910.pm
m04010.pm
m04110.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m04300.pm
m04400.pm
m04410.pm
m04500.pm
m04510.pm
m04520.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m04521.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m04522.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m04700.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m04710.pm
m04711.pm
m04800.pm
m04900.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m05000.pm
m05100.pm
m05300.pm
m05400.pm
m05500.pm
m05600.pm minor: add use "warnings"; to every perl script 2020-07-07 09:39:01 +02:00
m05700.pm
m05800.pm
m06000.pm
m06100.pm
m06300.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m06400.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m06500.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m06600.pm cosmetic: minor code style fixes 2020-06-13 11:19:00 +02:00
m06700.pm
m06800.pm
m06900.pm Fixed more constraints in unit tests 2019-02-16 16:04:37 +01:00
m07000.pm
m07100.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m07200.pm cosmetic: minor code style fixes 2020-06-13 11:19:00 +02:00
m07300.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m07400.pm Added -m 7401 = MySQL $A$ (sha256crypt), closes #2305 2020-02-11 11:36:16 +01:00
m07401.pm
m07500.pm
m07700.pm
m07701.pm
m07800.pm cosmetic: minor code style fixes 2020-06-13 11:19:00 +02:00
m07801.pm
m07900.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m08000.pm Add -m 8000 unit test 2019-02-17 15:10:39 +01:00
m08100.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m08200.pm
m08300.pm
m08400.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m08500.pm
m08600.pm
m08700.pm Add -m 9100 unit test 2019-02-18 09:48:39 +01:00
m08900.pm
m09100.pm Add -m 9100 unit test 2019-02-18 09:48:39 +01:00
m09200.pm
m09300.pm
m09400.pm Add -m 9600 unit test 2019-02-18 14:12:28 +01:00
m09500.pm
m09600.pm
m09700.pm
m09800.pm
m09900.pm
m10000.pm
m10100.pm
m10200.pm
m10300.pm
m10400.pm
m10500.pm
m10600.pm
m10700.pm
m10800.pm
m10810.pm
m10820.pm
m10830.pm
m10840.pm
m10870.pm
m10900.pm
m10901.pm
m11000.pm
m11100.pm
m11200.pm
m11300.pm tests: added verify code for -m 11300 = bitcoin/litecoin 2020-07-21 10:11:14 +02:00
m11400.pm
m11500.pm Fixed unit test initialization value for -m 11500 2021-10-01 20:16:47 +02:00
m11600.pm
m11700.pm tests: use python3/pip3 instead of just python/pip 2020-10-13 10:12:10 +02:00
m11750.pm
m11760.pm
m11800.pm tests: use python3/pip3 instead of just python/pip 2020-10-13 10:12:10 +02:00
m11850.pm
m11860.pm
m11900.pm
m12000.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m12001.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m12100.pm
m12200.pm
m12300.pm
m12400.pm
m12500.pm Restore maximum password length 128 for pure RAR3 kernels 2021-05-21 22:04:24 +02:00
m12600.pm
m12700.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m12800.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m12900.pm
m13000.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m13100.pm
m13200.pm tests: fixed -m 13200 = AxCrypt tests 2020-07-21 11:28:59 +02:00
m13300.pm
m13400.pm
m13500.pm
m13600.pm
m13800.pm
m13900.pm tests: cleanup and module deps fix 2022-01-30 10:35:51 +01:00
m14000.pm
m14100.pm
m14400.pm
m14700.pm
m14800.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m14900.pm
m15000.pm
m15100.pm
m15200.pm
m15300.pm Prepare for DPAPI masterkey Context 3 2022-03-06 00:47:14 +01:00
m15310.pm Added hash-mode: DPAPI masterkey file v1 (context 3) 2022-03-06 00:50:46 +01:00
m15400.pm Fix -m 15400 selftest-pair, benchmark-mask and unit-test 2019-11-21 09:39:07 +01:00
m15500.pm
m15600.pm
m15700.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m15900.pm
m15910.pm
m16000.pm Fixed more constraints in unit tests 2019-02-16 16:04:37 +01:00
m16100.pm Add unit tests for multiple modules: 2019-02-15 21:48:09 +02:00
m16200.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m16300.pm
m16400.pm
m16500.pm cosmetic: minor code style fixes 2020-06-13 11:19:00 +02:00
m16600.pm
m16700.pm cosmetic: minor code style fixes 2020-06-13 11:19:00 +02:00
m16800.pm
m16900.pm
m17300.pm Fixed more constraints in unit tests 2019-02-16 16:04:37 +01:00
m17400.pm
m17500.pm
m17600.pm
m17700.pm cosmetic: minor code style fixes 2020-06-13 11:19:00 +02:00
m17800.pm cosmetic: minor code style fixes 2020-06-13 11:19:00 +02:00
m17900.pm
m18000.pm
m18100.pm Fixed maximum password length limit which was announced as 256 but actually was 255 2019-02-26 21:20:07 +01:00
m18200.pm tests: cleanup and module deps fix 2022-01-30 10:35:51 +01:00
m18300.pm
m18400.pm
m18500.pm
m18600.pm
m18700.pm
m18800.pm
m18900.pm
m19000.pm Added QNX /etc/shadow hash cracking support 2019-02-27 17:53:00 +01:00
m19100.pm
m19200.pm
m19300.pm
m19500.pm Added hash mode 19500 2019-03-06 21:15:09 +01:00
m19600.pm
m19700.pm
m19800.pm
m19900.pm
m20011.pm tests: cleanup and module deps fix 2022-01-30 10:35:51 +01:00
m20012.pm
m20013.pm
m20200.pm
m20300.pm minor whitespace fixes, per #2841 2021-06-21 07:47:22 -08:00
m20400.pm
m20500.pm
m20510.pm
m20600.pm
m20710.pm
m20711.pm
m20720.pm
m20800.pm
m20900.pm
m21000.pm switch hash-mode from 1770 to 21000 2019-07-30 15:15:49 +02:00
m21100.pm switch hash-mode from 4720 to 21100 2019-07-30 15:19:22 +02:00
m21200.pm improved speed of -m 21200 by using pre-computed SHA1 hash 2020-07-26 18:00:09 +02:00
m21300.pm
m21400.pm
m21420.pm removed unused printf from 21420 test module 2022-02-13 19:03:24 +01:00
m21500.pm
m21501.pm
m21600.pm tests: cleanup and module deps fix 2022-01-30 10:35:51 +01:00
m21700.pm
m21800.pm
m22000.pm Initial -m 22001 support 2019-12-19 22:14:42 +01:00
m22100.pm
m22200.pm
m22300.pm Added -m 22300 = sha256($salt.$pass.$salt) 2020-01-15 09:16:05 +01:00
m22301.pm tests: solve telegram format conflict with jtr 2020-03-06 11:50:16 +01:00
m22400.pm
m22500.pm Fixes #1538: Added -m 22500 = MultiBit Classic .key (MD5) 2020-02-06 20:25:14 +01:00
m22600.pm Added -m 22600 = Telegram Desktop App Passcode (PBKDF2-HMAC-SHA1) 2020-04-08 14:31:47 +02:00
m22700.pm fixes #2383: added -m 22700 = MultiBit HD (scrypt) 2020-05-08 10:57:32 +02:00
m22911.pm
m22921.pm
m22931.pm
m22941.pm Update support for RSA/DSA/EC/OPENSSH Private Keys 2020-08-03 16:57:23 +02:00
m22951.pm
m23001.pm
m23002.pm
m23003.pm fixes #2410: added -m 2300x = SecureZIP 2020-05-31 10:36:41 +02:00
m23100.pm
m23200.pm
m23300.pm
m23400.pm
m23500.pm fixes #2510: Added -m 23500/23600 = AxCrypt 2 AES-128/256 2020-08-14 16:18:29 +02:00
m23600.pm
m23700.pm
m23900.pm
m24100.pm
m24200.pm
m24300.pm
m24410.pm tests: remove requirement Convert::ASN1 2020-10-13 10:26:45 +02:00
m24420.pm tests: remove requirement Convert::ASN1 2020-10-13 10:26:45 +02:00
m24500.pm
m24600.pm Add additional support for SQLCipher v3 and hashes SHA1 and SHA256 and a unit-test 2021-03-26 11:36:41 +01:00
m24700.pm
m24800.pm tests: cleanup and module deps fix 2022-01-30 10:35:51 +01:00
m24900.pm
m25000.pm
m25100.pm tests: cleanup and module deps fix 2022-01-30 10:35:51 +01:00
m25200.pm
m25300.pm
m25400.pm tests: cleanup and module deps fix 2022-01-30 10:35:51 +01:00
m25500.pm
m25600.pm
m25700.pm
m25800.pm
m25900.pm minor whitespace fixes, per #2841 2021-06-21 07:47:22 -08:00
m26000.pm
m26100.pm
m26200.pm
m26300.pm
m26401.pm Added hash-mode: AES-128/192/256-ECB NOKDF 2021-06-26 17:12:10 +02:00
m26402.pm
m26403.pm Added hash-mode: AES-128/192/256-ECB NOKDF 2021-06-26 17:12:10 +02:00
m26500.pm
m26600.pm
m26700.pm tests: cleanup and module deps fix 2022-01-30 10:35:51 +01:00
m26800.pm
m26900.pm
m27000.pm
m27100.pm
m27200.pm
m27300.pm
m27400.pm move to 27400, fix unit test 2021-08-10 16:35:15 +02:00
m27500.pm tests: cleanup and module deps fix 2022-01-30 10:35:51 +01:00
m27600.pm
m27700.pm
m27800.pm
m27900.pm
m28000.pm Added hash-mode: CRC64Jones 2021-10-09 11:43:04 +02:00
m28100.pm tests: get rid of wrong modules from -m 28100 2021-11-29 17:12:56 +01:00
m28200.pm
m28300.pm
m28400.pm
m28501.pm
m28502.pm
m28503.pm
m28504.pm
m28505.pm Add -m 28505/28506, Bitcoin WIF, P2SH(P2WPKH)/compat address 2022-06-29 18:15:48 +02:00
m28506.pm
m28600.pm
m28700.pm
m28800.pm fix test/verify for -m 28800 2022-06-29 18:01:55 +02:00
m28900.pm
m29000.pm add unit tests for -m 29000 2022-06-08 15:44:14 +02:00
m29100.pm
m29200.pm radmin 3: remove whitespace, add credits to tests 2022-05-30 16:59:30 +02:00
README.md

Hashcat test modules

Each module provides the functions module_constraints, module_generate_hash and module_verify_hash.

  • The module_constraints function should return the minimum and maximum length of the password, salt and the combination of password and salt in following order: password (pure), salt (pure), password (optimized), salt (optimized) and combination (optimized). Each pair should be set to -1 if the hash mode is not supporting the appropriate field. For example, if a hash-mode does not support a salt, it should be set to -1. The last field (combination) is important if the password and the salt is stored in the same buffer in the kernel (typically raw hashes only).
  • The first parameter to module_generate_hash is the password, which can be either in ASCII or binary (packed) form. The second parameter is the salt *which can be undefined for unsalted hash modes).
  • The module_verify_hash function accepts a line from the cracks file, without the newline characters.

During single and passthrough tests the module_generate_hash function must provide random values (e.g. salt) for hash generation if necessary. The test.pl script offers a few handy functions like random_hex_string, random_numeric_string and random_bytes. You can implement your own salt generation functions, if your mode has specific requirements.

During verify tests the module_verify_hash function must parse the hash:password line and calculate a hash by passing all necessary data to module_generate_hash. How you pass it is up to you, as long as the first parameter is the password.

Important: You have to call pack_if_HEX_notation as soon as you have parsed the password, or your tests will fail on passwords in the $HEX[...] format.

If the algorithm has ambiguous hashes (e.g. partial case-insensetivity), the test module can provide an optional function module_preprocess_hashlist. It recieves a reference to the hashlist array and can unify the hashes in a way that guarantees the match with the output of module_verify_hash.

Examples

  • For the most basic test modules, see m00000.pm and m00100.pm
  • For the basic salted hash tests, see m00110.pm and m00120.pm
  • For some sligthly more complex modules with PBKDF2 and encryption, see m18400.pm and m18600.pm
  • For a test module with hashlist preprocessing and a custom salt generation algorithm, see m05600.pm