Today, 01:39 AM
(Yesterday, 07:01 PM)atom Wrote: Basically, as with all crackers, what you need is a way to verify if a password is correct. With most algorithms used today, you simply have to reproduce what the target application does. For example, if you know the algorithm uses PBKDF2, then you use PBKDF2. If you know that AES is needed afterwards, such as decrypting some data and then checking for a specific pattern, you follow the same steps. Many algorithms follow this exact pattern, and it is easy to find a template kernel implementation for such cases.
There is a useful pull request that is not yet merged because it is out of date, but it is a good starting point for learning how to write an efficient hashcat kernel: https://github.com/hashcat/hashcat/pull/4127