|
Message-ID: <loom.20060616T190551-906@post.gmane.org> Date: Fri, 16 Jun 2006 17:16:25 +0000 (UTC) From: Phantom <phantom_otw@...oo.com> To: john-users@...ts.openwall.com Subject: Inverted chatsets? Hey Solar Was wondering if you would consider an option/switch for creating "inverted charsets" using the opposite of the algorithm used to create the default charsets. Consider the following scenario: a passfile with e.g. 1000 hashes. You have run -single mode, wordlist mode, wordlist -rules and have run the different incremental modes for several days/weeks/months... After all these runs, you still have 50-100 hashes left that have not yet been decrypted. So it might be, that since you have tried the conventional methods, and they have stopped beeing efficient, it might be that these last hashes have passwords that do NOT follow the conventional patterns and therefor it will take very long to hit them with normal charsets. However, if one were to attack them using charsets that are the inverted or opposite of the default created ones, one might get faster hits on these leftover hashes? This might be complete nonsense, but atleast would be interesting to see if opposite charstes would have a better hitrate on these kind of leftover hashes that have already been worked on alot by concentioanl methods and might not follow the conventional "rules" for password creation.... Regards
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.