|
Message-ID: <5f4239741003080816g6590553fq4355ec1d3457e637@mail.gmail.com> Date: Mon, 8 Mar 2010 10:16:19 -0600 From: Minga Minga <mingakore@...il.com> To: john-users@...ts.openwall.com Subject: Re: john.conf provided with JTR by default > No, I do not readily have a better ruleset, and creating one is not one > of my priorities. Other people have been working on this lately - some > have posted their results in here (thanks!) None of this looked like > something I would want to include into the default john.conf, though. All, I will be presenting at numerous conferences this year on this exact topic. i.e. creating john the ripper rules based on real password analysis of complex passwords. I have essentially created multiple large rules that match patterns that are chosen by users in corporate environments. These users are required to meet certain password complexity rules - but still choose poor passwords based upon recognizable patterns. I will be sharing all my data/rules/wordlists once all the conferences are done. This will be around August 2nd (End of Defcon in Vegas). Even my rules, which are based on about 2.9 million cracked passwords are not 'clean/precise' enough to be included in the default john the ripper ruleset. But they will be easily usable using --rules:insert_rule_here functionality. ----------- Also: Does anyone hang out in IRC all day? There is a #john channel on freenode: -ChanServ- [#john] This channel devoted to discussion of JTR aka John the Ripper Im just sitting there if anyone wants to talk password crackin' -Minga
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.