Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+E3k92Fxu9T-vr-wVasT-EehSEzXjuv6w=-7yUn_i5Sw7moJQ@mail.gmail.com>
Date: Tue, 18 Aug 2020 08:21:12 -0800
From: Royce Williams <royce@...ho.org>
To: john-users@...ts.openwall.com
Subject: Re: any experience with hasheshorg2019 wordlist?

Hello, Albert -

On Tue, Aug 18, 2020 at 7:17 AM Albert Veli <albert.veli@...il.com> wrote:

> Hello, I have not used that list. But the site https://hashes.org/ had
> many leaks of live hashes and I suspect the wordlist you mention is a
> collection of cracked hashes from the live ones. As you can see on the
> site it had a failure (hard drive?) and is currently down.
>

>From my read of s3's blog posts, the previous server ended up having bad
RAM, which was slowly corrupting the Cassandra database. The database is
being reconstructed on new hardware, which takes quite a bit of time (and
has to be interleaved with other activities, as time allows).

A static version of the site, including all of the found lists, is
currently available at temp.hashes.org.


> Typically if you want statistics it is better to use rockyou since it
> has a big collection of all real passwords, while the hashes.org only
> has cracked ones and is missing maybe 10% of the hardest passwords.
> That way the statistics gets skewed and only reflect the weakest 90%
> of the passwords.
>

I'll have to disagree with you there. :) The hashes.org founds contain 100%
of RockYou - as well as 100% of other similar plaintext leaks (such as the
more recent LiveJournal leak) - due to their presence in other lists (such
as the Have I Been Pwned corpus). Since these were cracked using those
original plaintexts, they are fully represented.

The leaks on hashes.org are from a variety of sources, platforms, and time
periods - and therefore a variety of demographics / cultures / countries.

Also, the crack rate for fast hashes is much higher - on the order of 99%
and up for many leaks based on fast hashes. And the success rate is
constantly going up, as new leaks are made public elsewhere and are used as
raw material to attack old lists.

For these reasons, the superset of all hashes.org "founds" is one of the
most efficient broad-spectrum attack wordlists (that is publicly and freely
available) for real human passwords.

(The hashes.org "junk" founds are those founds that are less likely to be
human-generated passwords, but are also very useful as a later pass, for
cleaning up non-human-generated founds in target hashes.)

Royce


> On Tue, Aug 18, 2020 at 2:18 PM Johny Krekan <krekan@...nykrekan.com>
> wrote:
> >
> > Hello, after some time I went to weakpass.com and I have found
> > hashesorg2019, which seems quite new and big. Do you have any experience
> > with this wordlist (success in finding passwords). Do you think that it
> > could contain many new passwords or is it recompilation of old ones?
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.