|
Message-ID: <4492EF93.30702@mail.ru> Date: Fri, 16 Jun 2006 20:51:15 +0300 From: Pietari Kivikangas <JTR1998@...l.ru> To: john-users@...ts.openwall.com Subject: Re: Inverted chatsets? I'm not Solar, but i'll answer Phantom wrote: > Hey Solar > > Was wondering if you would consider an option/switch for creating > "inverted charsets" using the opposite of the algorithm used to create the > default charsets. > The algorithm opposite to the one used to create the charset file is the algorithm used to generate password candidates. > Consider the following scenario: > a passfile with e.g. 1000 hashes. > You have run -single mode, wordlist mode, wordlist -rules and have run the > different incremental modes for several days/weeks/months... > > After all these runs, you still have 50-100 hashes left that have not yet been > decrypted. > So it might be, that since you have tried the conventional methods, and they > have stopped beeing efficient, it might be that these last hashes have > passwords that do NOT follow the conventional patterns and therefor it will take > very long to hit them with normal charsets. > How would you know that? There's no time limit for incremental mode. You can potentially get a suitable password candidate in, for example, 5 years and it will look like these: 0065aM> 0065aH> 0065a > 0065aP> 0065aB> 0065a%> 0065a^> > However, if one were to attack them using charsets that are the inverted or > opposite of the default created ones, one might get faster hits on these > leftover hashes? > By definition, a charset file inverted to the original one is such charset which can be used to produce ALL password candidates EXCEPT for those which can be produced using the original charset file.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.