Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CANWtx02frrnsMGrswyM42BUFWvbZvoeeuJpnA3GsJLXMAp0i2w@mail.gmail.com>
Date: Fri, 14 Aug 2015 21:35:38 -0400
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Annotated wordlists

On Fri, Aug 14, 2015 at 7:15 PM, Tonimir Kisasondi <kisasondi@...il.com> wrote:
> Hello everyone,
>
> This is my first time posting here, so, hello everyone, I'm Tonimir and
> i am kinda interested in password cracking and research in the same
> area.
Welcome!
> So, one of the things i like are default passwords and dictionaries for
> default passwords. Be it default passwords that are vendor pre-set or
> backdoors that are found by researchers, but sometime you want to have a
> large list, but select only passwords that are backdoors, or only those
> that work on HP servers. Also, sometimes you want to "annotate"
> wordlists for instance, selecting just the top 75% of the statistically
> occuring elements that are used in leaked password lists. Or only words
> that are "tech" related or only "french". Or do a reverse lookup: why
> did the password b4dg3r5 work from this default password list on this
> HP device. You get the idea, the possibilities are endless, and this opens
> the avenue for more interesting password cracking attacks and methods.
Many "default" password lists exist, it would be interesting to add
default website passwords if they exist. Maybe AT&T issues everyone the
same random looking password for their wifi or something like that.
>
> 1) Do you think something like that is useful? What's your opinion on this?
I think some lists like that exist, and have some metadata with them
already, perhaps not the meta you want however.
http://www.phenoelit.org/dpl/dpl.html
http://www.routerpasswords.com/
http://www.answersthatwork.com/Download_Area/ATW_Library/Networking/Network__4-List_of_default_Router_Admin_Passwords_and_IP_addresses.pdf
> 2) Would you be interested in accepting a patch/toolchain to enable this
> functionality in john? The core would be unchanged, it's only a python
> script that helps you to manipulate annotated wordlists (awl)
> 3) Of course I'm experimenting with this functionality in python
> currently, but i would love to hear your opinion on the whole matter. If
> you think this is interesting, I'm more then willing to contribute the
> necessary code into jumbo.
Someone else was talking about probability recently here on the list:
http://www.openwall.com/lists/john-users/2015/06/11/1
It was related the HC's Prince attack. Some list's I think have been
sorted by probability,
https://wiki.skullsecurity.org/Passwords
(see phpbb - sorted by "commonness")
Incremental mode works on this principal to some degree, using
trigraphs rather than "whole words". John "learns" what is
probable from training it on wordlists, and currently the .chr
files are created using Rockyou.txt as the basis for guessing.

G:\CMIYC-2015>john.exe -stdout -inc
123456
12345
111189
123455
111188
12344
121288
121289
112345
112344
123123
123121
121987
121989
111288
111289
112222
112224
11111
11110
marissa
---
Incremental is very good and a very powerful method of cracking.
Most wordlists on the net are simply sorted by alphabet typically.
The meta could get out of hand, you could include top passwords
for policies (1 upper, one lower, one special, 8 or more long etc).
You could make meta data for websites, wifi, algo (md5, durpal,
mediawiki, des etc..) and subcatagories, photo websites, dating
websites...
It's all very interesting, and beyond my capabilities, I'm glad
someone wants to explore it further. I think some meta could
be useful, but the most useful data may not be shared or
revealed. I bet Age, Sex, Region/Country, Religion and just
about anything else could contribute to password choice, maybe
even mood at the time :)

During CMIYC 2015 I trained JtR on the passwords we cracked
and immediately got passwords across each hash type. Stats or
meta about a target could be useful in an attack, maybe pass's
from Amazon users would be similar to TigerDirect, or Gmail
will be similar to Hotmail/0365. We keep getting leaks of passes
and there could be meta were missing, but the main thing
being found, is poor password choices like 123456. That's
partly why Incremental tries that one first, it's frequency in
Rockyou.txt made sure it got to the top.

Here is some output from my Street.chr, they don't look like
what a user would ordinarily use, but they were great during
the contest!
G:\CMIYC-2015>john.exe -stdout -inc=street
éCLAt
ñata
éCLAN
é&&&
ñato
é&&a
älska
älski
körgen
éthen
éther
äpPlO
äpPle
ñaja
ñaje
é&é
é&á
ñeko
ñeka
ñeut
ñeuk
édel
édes
édé
édù
éCRue
Prince mode too is pretty awesome, and they have
some of the same goals I think your after, but they
produce the likely candidates rather than store them
in a "static" file or database.
https://hashcat.net/events/p14-trondheim/prince-attack.pdf
We need more work like this, I hope I wasn't too
disparaging. I think we need more ideas like Prince or
metadata passwords.I would love a way to SHARE
metadata without giving away enough information
that it can be traced to a company or person.
We've all talked about this stuff, or simialr items
a lot, this was a good thread...
http://www.openwall.com/lists/john-users/2012/09/11/6

-rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.