Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <46C0034030C24E6685C208E0CF8D746B@apple9d23c8f76>
Date: Thu, 6 Feb 2014 10:29:39 +0100
From: "JohnyKrekan" <krekan@...nykrekan.com>
To: <john-users@...ts.openwall.com>
Subject: questions about Incremental attack

Hello, I would like to ask what mathematical principles are used in John's Incremental attack
I use John to generate potential passwords for testing WPA PSK network's security.
I have generated my own chr file from my wordlist and then use
john -i=alpha --stdout 
(I replaced standard alpha with my own)
to generate those candidates which are very useful.
My questions are:
1. What mathematical method is used to generate the chr file from the wordlist? Where could I read more about that?
2. What is the algorithm which is used to generate the potential candidates using this table?
Any links which contain informations about mathematical algorithms used in This incremental attack would be very useful for me.
Nice day
Jan Krekan

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.