Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Re-Add padding attack to 7zip #4003

Open
micsthepick opened this issue May 15, 2024 · 0 comments
Open

Re-Add padding attack to 7zip #4003

micsthepick opened this issue May 15, 2024 · 0 comments

Comments

@micsthepick
Copy link

GitHub is for bugs and features - not for support
For support, please use the hashcat forums https://hashcat.net/forum/

Check the FAQ
Some items that might appear to be issues are not issues. Please review the hashcat FAQ https://hashcat.net/wiki/doku.php?id=frequently_asked_questions before submitting a bug report.

Describe the feature
Hashcat used to use a padding attack to crack 7z archives - I've verified that the files from the specific version of 7zip used in file X will most likely have used null padding bytes, so I'd like to compare hashcat's speed in cracking X to JtR (and also wouldn't mind being able to use hashcat features), as I've determined that the padding attack seems much faster.

Current behavior
as of 1f93d20, aa14b4e and af3619f, truncated (padding based) 7zip hashes are unsupported, and return a token length exception.

Expected behavior
When providing hash with type $7z$128$... hashcat correctly parses it and perhaps displays a big red or yellow warning, but still proceds to crack it, perhaps after seeking user confirmation or by a command line switch if necessary

Hashcat version (please complete the following information):

  • OS: Any
  • Distribution: ..
  • Version: 6.2.6 (beta)

Additional context
Add any other context or screenshots about the feature request here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant