Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BLU0-SMTP210A69D6C6CADB06BCC7EB2FD390@phx.gbl>
Date: Mon, 16 Apr 2012 00:01:20 +0200
From: Frank Dittrich <frank_dittrich@...mail.com>
To: john-users@...ts.openwall.com
Subject: Re: .chr files

On 04/15/2012 11:20 PM, Aleksey Cherepanov wrote:
>> You assume that incremental mode will be a good tool to model password
>> > patterns. I do not believe this is the case for most, even if it worked
>> > reasonably well during the constest.
> It is assumption without any real practice.

So may be we might need some tests on real-life passwords.
Either a large set of saltless hashes, or even a large list of cracked
passwords from various hashes, converted for --format=dummy.
Then it is possible to do some measurements and evaluate this approach
(compare it with alternatives).

Frank

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.