Issue with ChaCha20 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Issue with ChaCha20 (/thread-8710.html) |
Issue with ChaCha20 - Mem5 - 10-11-2019 Hi, Trying to crack the sample ChaCha20 hash from the source code : Code: static const char *ST_PASS = "hashcat"; Code: hashcat -m 15400 cha.hash wdlist.txt Code: Status...........: Exhausted Why Rejected.........: 1/1 (100.00%) ? Same result on hashcat v5.1.0 and beta 5.1.0+1394. Same result with the hash from samlple page https://hashcat.net/wiki/doku.php?id=example_hashes Thanks. RE: Issue with ChaCha20 - philsmd - 10-12-2019 hmm, I see the problem here. it's not very clear what is going on (at least for the general hashcat user ! ) The key in theory is always 32 bytes, but it's neither mentioned within the example wiki page, nor is the ST_PASS in src/modules/module_15400.c correctly reflecting this fact (even though module_pw_min () and module_pw_max () set the password length to 32 fixed (but "hashcat" is used for ST_PASS). for now this password will work: $HEX[6861736863617400000000000000000000000000000000000000000000000000] i.e. "hashcat" but expanded to 32 bytes with NUL bytes appended (up to 32 bytes) Since the code is able to do the expansion internally, we should just set pw_min to 0 i.e. in module_pw_min (), or skip it entirely since the default minimum password is zero. We probably need a github issue for this mentioning to remove the pw_min restriction. RE: Issue with ChaCha20 - Mem5 - 10-12-2019 Got it. Thanks, I've created a github issue : https://github.com/hashcat/hashcat/issues/2199 |