|
Message-ID: <CA+E3k93fpBCXVwAqp5+DWFvvVhKc69=ZQ8uqVYvQ+RcReOhoFQ@mail.gmail.com> Date: Sat, 11 Jun 2016 06:08:04 -0800 From: Royce Williams <royce@...ho.org> To: john-users@...ts.openwall.com Subject: Re: Derive stats/rules/masks from a bunch of plains On Sat, Jun 11, 2016 at 3:15 AM, magnum <john.magnum@...hmail.com> wrote: > On 2016-06-10 19:18, Patrick Proniewski wrote: > >> I've got a bunch of plains. About 1500 of them are 8 char long, mostly >> random and issued at account creation and not changed since. The 12000 >> other plains are user picked after account creation, ranging from 9 to 49 >> char long. >> >> What would be the best tool(s) to derive interesting stuffs from these >> plains like rules/masks/statistics…? Anything that would help me optimize >> cracking sessions (these are not supposed to be plains, I plan to make a >> password audit by cracking their hash counterparts, and I've got about >> 24000 more hashed password from same source). >> > > We have a quick'n'dirty "unrule.pl" in Jumbo's run directory, based on a > oneliner by epixoip IIRC. It tries to un-l33t words, chop other characters > and produce a unique list of base words. Run that on your plains and then > use the output as a wordlist with some gigantic ruleset like --rules=all > (or, for slower hash types, some smaller ruleset with more finesse). > > This is a very rough tool though, there are more advanced ones around. I > think a recent thread on Hashcat forums mentioned a few tools. This may also be of interest: https://thesprawl.org/projects/pack/ Royce
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.