Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20210321163549.GA17170@openwall.com>
Date: Sun, 21 Mar 2021 17:35:49 +0100
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: password patterns (was: Multi-gpu setup)

On Sun, Mar 21, 2021 at 10:53:39AM +0100, Micha?? Majchrowicz wrote:
> > Incremental mode follows patterns seen in the passwords it was trained
> > on.  The supplied .chr files were trained on RockYou.  If your patterns
> > are similar, they should work well.  If your patterns are very
> > different, you'll need to re-train on those for it to work well.
> That's what I want to check and what I fear is the issue. Training at
> the moment would be hard as I don't have many of those hashes. I think
> I first would have to generate some pseudo-random set.

I suggest you start by seeing how the pre-existing .chr files perform.
In fact, start with the default ascii.chr without restrictions.

Then for specific patterns you want JtR to focus on, you can grep the
RockYou list leaving only passwords matching those patterns.  Generate a
.chr file from that.  See how it performs.  Adjust the patterns you grep
for, and repeat.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.