|
Message-ID: <CABob6irP4CQ-e9puU3D9VCsb1s10RLrn--B8KAwDB-UVjLxebQ@mail.gmail.com> Date: Wed, 10 Dec 2014 04:20:53 +0100 From: Lukas Odzioba <lukas.odzioba@...il.com> To: john-users@...ts.openwall.com Subject: Re: PRINCE approach from hashcat 2014-12-10 4:01 GMT+01:00 Royce Williams <royce@...ho.org>: > What's hashcat up to here? I only skimmed the PDF briefly. > > https://hashcat.net/tools/princeprocessor/ For me it looks like combinator attack generalized to a given final password length. > – Generate password with chain It is not covered in the presentation but I assume it is string concatenation, but there could be some additional rule engine to build passwords from n "roots" or "base word sets", this in some cases would break chain length limit which I guess might be some kind of optimization. I like the idea, and it is good to see that someone is still working on new methods. Lukas
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.