|
Message-ID: <600202.12098.qm@web24610.mail.ird.yahoo.com> Date: Sun, 5 Sep 2010 02:25:05 +0000 (GMT) From: Mr Ex <ex_says@...oo.co.uk> To: john-users@...ts.openwall.com Subject: Re: Noob question #2: how to set to prefix more than one character, a word, in wordlist rules/elsewhere... very simply Many thanks for your response and I didn't find it discouraging... you obviously pointed out that 10 alphanum char brute would take far longer than I had, for some reason, vaguely presumed. Wanted to try something else this time, namely prefixing a word to a peoples names wordlist, and also maybe appending some digits, maybe even more than one, again for aircrack piping. May sound really dumb and schoolboy here but I'm struggling to grasp and how to generate the john.pot to then make the .chr (specifically I don't grasp where all.gz is from that example you gave http://www.openwall.com/lists/john-users/2007/07/04/6, or if I am even to use that?). It appears I do have to grasp how to generate the .chr file for this word prefix idea too because I can't just amend the wordlist rules part of john.conf as that way only seems to let you prefix one single alph char to the beginning..? (So in my case it will only prefix potential passphrases with 'v' rather than the whole word I want?) If I'm wrong on that (I'm hoping I am so I could just set it in john.conf!) please do correct me ;-) Thanks again in advance for tolerating any noobidity I've shown here ;-) ----- Original Message ---- From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Sent: Wed, 1 September, 2010 22:53:36 Subject: Re: [john-users] Noob question: how to feed 10 alphanum char min&max incremental to aircrack when "MaxLen = 10 exceeds the compile-time limit of 8" On Wed, Sep 01, 2010 at 07:28:22AM +0000, Mr Ex wrote: > john --stdout --incremental:alnum | aircrack-ng (etc etc...) [...] > But for what I want to do, feeding, nothing to do with hashes, 10-only and > alphanum only seems reasonable..? No, it does not seem reasonable. aircrack-ng will only be able to test a relatively small number of candidate passwords per second, so you'd only search a very small fraction of the "10-only and alphanum" keyspace during your lifetime. Incremental mode's smart ordering of candidate passwords is of some help to improve your chances of a successful crack, though - from "negligible" to "almost negligible". (For fast-to-compute password hashes - e.g., Windows passwords - this would be very different.) If you must, this old posting referenced by Rich has the complete set of params.h settings for you to use: http://www.openwall.com/lists/john-users/2007/07/04/6 The very first set of settings ("for lengths up to 10") will be it. Then you put something hopefully-relevant into your john.pot (see one example with all.gz in the above posting) and generate a new .chr file: john --make-charset=alnum10.chr --external=filter_alnum Finally, you add an incremental mode section that will use alnum10.chr. However, for attacking "something slow" and for a likely relatively long password, you should really focus on using wordlists instead. If the target password is not crackable with wordlists with rules, if it is 10 characters long, and if candidate passwords are slow to test - that is, if all three of these are true at once - then you're out of luck cracking the password. You may improve your chances somewhat by questioning your assumptions - are you 100% sure that the password is 10 characters long, or are you maybe only 99% sure? In the latter case, you have an up to 1% chance of cracking the password by trying shorter lengths instead - and 1% is pretty good compared to what you'd achieve if you approach the task like you had proposed. I hope this response helps, and I hope you do not find it discouraging. I did not mean it as such. :-) Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.