Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 23 Jun 2016 20:27:05 +0200
From: Luis Rocha <luiscrocha@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Cracking multi-word passwords

Hello,

Others in this list can provide much more detail but one good option you
have is to use JtR Prince mode which will do what you want.

You can try the following options --prince=dictionary --prince-case-permute
--prince-elem-cnt-min=5 --prince-elem-cnt-max=5.
The --prince-elem-cnt-min=5 defines how many minimum words from the dic
will be "combined" and the max the maximum ones. The prince-case-permute
will permute the first letter of each word.

You can read more about this mode under JtR doc folder in PRINCE file.

Hope it helps
Luis

On Thu, Jun 23, 2016 at 5:55 PM, Jerome Das <ninjaapplebeer@...il.com>
wrote:

> Hi:
>
> I am looking for some help in cracking passwords that is in the following
> formats (well structured):
>
>
> word1?word2?word3?word4
>
> It is always 4 words from a predefined dictionary and '?' is a single digit
> or symbol.
>
> For example,
>
> syntax=inside!soup3amid
>
>
> What would be the JtR rules for above ?
>
> Also, what attack mode would be the most effective ?
>
> (hashcat provides the combinator attack. But it seems to be up to 3 words)
>
> Thank you in advance !
>
> Jerome
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.