|
Message-Id: <26F938A2-2FDD-4B40-9084-C0336D351A80@patpro.net> Date: Sat, 11 Jun 2016 16:21:16 +0200 From: Patrick Proniewski <patpro@...pro.net> To: john-users@...ts.openwall.com Subject: Re: Derive stats/rules/masks from a bunch of plains On 11 juin 2016, at 13:15, magnum wrote: > On 2016-06-10 19:18, Patrick Proniewski wrote: >> I've got a bunch of plains. About 1500 of them are 8 char long, mostly random and issued at account creation and not changed since. The 12000 other plains are user picked after account creation, ranging from 9 to 49 char long. >> >> What would be the best tool(s) to derive interesting stuffs from these plains like rules/masks/statistics…? Anything that would help me optimize cracking sessions (these are not supposed to be plains, I plan to make a password audit by cracking their hash counterparts, and I've got about 24000 more hashed password from same source). > > We have a quick'n'dirty "unrule.pl" in Jumbo's run directory, based on a oneliner by epixoip IIRC. It tries to un-l33t words, chop other characters and produce a unique list of base words. Run that on your plains and then use the output as a wordlist with some gigantic ruleset like --rules=all (or, for slower hash types, some smaller ruleset with more finesse). Thanks. I've just gave unrule.pl a try, but the result is not so great. Probably works OK on bigger dumps (rockyou…), but for my relatively small corpus, it does not perform very well. > This is a very rough tool though, there are more advanced ones around. I think a recent thread on Hashcat forums mentioned a few tools. I'm going to dig there. Thanks for the tip. pat
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.