class Hashcat < Formula desc "World's fastest and most advanced password recovery utility" homepage "https://hashcat.net/hashcat/" # Note the mirror will return 301 until the version becomes outdated. url "https://hashcat.net/files/hashcat-4.2.1.tar.gz" mirror "https://hashcat.net/files_legacy/hashcat-4.2.1.tar.gz" sha256 "7dad73c3406e66756b19e15ae8bcc482a52a422e8fb905feb6db4d2eb32e5320" version_scheme 1 head "https://github.com/hashcat/hashcat.git" bottle do sha256 "e3b79b41df423b3574012ffa580e92b6b4e38d24bdfc652692af128e6cafb1ce" => :mojave sha256 "4f16d55d6180cf0f4dc8bb93c5c747919ff81ca73f49235c9a906020508ae44e" => :high_sierra sha256 "d03c80e77174389dc5c6983a7400810abcf07ecd8cdc88de546a185a9014c727" => :sierra sha256 "63ca34c2ed34998d779e906210e06f3f46c4becc9410c00985dfdecf0daf5f8f" => :el_capitan end depends_on "gnu-sed" => :build # Upstream could not fix OpenCL issue on Mavericks. # https://github.com/hashcat/hashcat/issues/366 # https://github.com/Homebrew/homebrew-core/pull/4395 depends_on :macos => :yosemite def install system "make", "CC=#{ENV.cc}", "PREFIX=#{prefix}" system "make", "install", "CC=#{ENV.cc}", "PREFIX=#{prefix}" end test do # # General test settings # binary = "./hashcat" pass = "hash234" hash_type = "500" # -m 500 = md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5 dict_file = "example.dict" hash_file = "example#{hash_type}.hash" additional_args = " --force" + # shouldn't be needed with a correct OpenCL installation " --quiet" + # we only need the hash:pass pair in the output " --potfile-disable" # we do not need to check or write the hashcat.potfile # # Copy some files to the test folder # # copy all files from share to the test folder cp_r pkgshare.children, testpath # copy the example hash and the dictionary file to the test folder cp "#{doc}/#{hash_file}", testpath cp "#{doc}/#{dict_file}", testpath # copy the hashcat binary to the test folder cp "#{bin}/#{binary}", testpath # # Test 1 (dictionary attack, -a 0): # hash = File.open(hash_file, "rb") { |f| f.read.strip } attack_mode = "0" cmd = binary + " -m " + hash_type + " -a " + attack_mode + additional_args + " " + hash_file + " " + dict_file # suppress STDERR output cmd += " 2>/dev/null" assert_equal "#{hash}:#{pass}", shell_output(cmd).strip # # Test 2 (combinator attack, -a 1): # attack_mode = "1" dict1 = "dict1.txt" dict2 = "dict2.txt" File.write(dict1, pass[0..3]) File.write(dict2, pass[4..-1]) cmd = binary + " -m " + hash_type + " -a " + attack_mode + additional_args + " " + hash_file + " " + dict1 + " " + dict2 # suppress STDERR output cmd += " 2>/dev/null" assert_equal "#{hash}:#{pass}", shell_output(cmd).strip # # Test 3 (mask attack, -a 3): # attack_mode = "3" mask = "?l?l?l" + pass[3..-1] cmd = binary + " -m " + hash_type + " -a " + attack_mode + additional_args + " " + hash_file + " " + mask # suppress STDERR output cmd += " 2>/dev/null" assert_equal "#{hash}:#{pass}", shell_output(cmd).strip # # Test 4 (hybrid attack, dict + mask, -a 6): # attack_mode = "6" mask = "?d?d?d" cmd = binary + " -m " + hash_type + " -a " + attack_mode + additional_args + " " + hash_file + " " + dict1 + " " + mask # suppress STDERR output cmd += " 2>/dev/null" assert_equal "#{hash}:#{pass}", shell_output(cmd).strip # # Test 5 (hybrid attack, mask + dict, -a 7): # attack_mode = "7" mask = "?l?l" + pass[2..3] cmd = binary + " -m " + hash_type + " -a " + attack_mode + additional_args + " " + hash_file + " " + mask + " " + dict2 # suppress STDERR output cmd += " 2>/dev/null" assert_equal "#{hash}:#{pass}", shell_output(cmd).strip end end