|
Message-ID: <CAEo4CeM0PZFKH1E0YU7iH893tbb=35EWTVeAZBoA_cMhx7LwCQ@mail.gmail.com> Date: Fri, 21 Aug 2015 14:03:02 +0200 From: Albert Veli <albert.veli@...il.com> To: john-users@...ts.openwall.com Subject: Re: Anyone looked at the Ashley Madison data yet? Hi, On Fri, Aug 21, 2015 at 11:11 AM, François <francois.pesce@...il.com> wrote: > If it wasn't for the horribly slow cost 12 of bcrypt, that leak would > be an amazing source of analysis for password forging, as it contains > birthdates (where at least the year seems to be reliable), and > country/city too. > Bcrypt is so slow it is impossible to work with a list that big. But it is possible to split it into, say 1000 hashes per file. With a short list, like this: https://github.com/danielmiessler/SecLists/blob/master/Passwords/top_shortlist.txt it still takes half an hour to just try these 26 words... And for 36 million hashes, you get 36000 files with 1000 hashes in each. I get dizzy just thinking about the amount of work it would take to just try the shortlist.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.