Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BLU0-SMTP29730B2BB5C421D106AB1D6FD3E0@phx.gbl>
Date: Mon, 16 Apr 2012 12:31:54 +0200
From: Frank Dittrich <frank_dittrich@...mail.com>
To: john-users@...ts.openwall.com
Subject: Test data (Was: .chr files)

On 04/16/2012 10:43 AM, Simon Marechal wrote:
> On 16/04/2012 00:01, Frank Dittrich wrote:
>> So may be we might need some tests on real-life passwords.
>> Either a large set of saltless hashes, or even a large list of cracked
>> passwords from various hashes, converted for --format=dummy.
> 
> This :
> 
> https://www.korelogic.com/InfoSecSouthwest2012_Ripe_Hashes.html

Just the raw-md5 hashes (about 140 millions) are more than enough for
testing.
You could even just use a fraction of 1/16 of these hashes, e.g.,
LC_ALL=C grep "0$" raw-md5.hashes.txt > testdata-0

These should fit into memory on a decent computer, and when you finished
your tests on this sample, you can use the next set of test data to
verify how useful your strategy is on this one.

I changed the subject, because useful test data is not only needed to
generate .chr files and evaluate their quality, but for other cracking
strategies as well.

Frank

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.