Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <82f40ffb3c62213b87ef6a389013f2c6@smtp.hushmail.com>
Date: Sat, 11 Jun 2016 13:15:18 +0200
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: Derive stats/rules/masks from a bunch of plains

On 2016-06-10 19:18, Patrick Proniewski wrote:
> I've got a bunch of plains. About 1500 of them are 8 char long, mostly random and issued at account creation and not changed since. The 12000 other plains are user picked after account creation, ranging from 9 to 49 char long.
>
> What would be the best tool(s) to derive interesting stuffs from these plains like rules/masks/statistics…? Anything that would help me optimize cracking sessions (these are not supposed to be plains, I plan to make a password audit by cracking their hash counterparts, and I've got about 24000 more hashed password from same source).

We have a quick'n'dirty "unrule.pl" in Jumbo's run directory, based on a 
oneliner by epixoip IIRC. It tries to un-l33t words, chop other 
characters and produce a unique list of base words. Run that on your 
plains and then use the output as a wordlist with some gigantic ruleset 
like --rules=all (or, for slower hash types, some smaller ruleset with 
more finesse).

This is a very rough tool though, there are more advanced ones around. I 
think a recent thread on Hashcat forums mentioned a few tools.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.