|
Message-ID: <20210321163549.GA17170@openwall.com> Date: Sun, 21 Mar 2021 17:35:49 +0100 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: password patterns (was: Multi-gpu setup) On Sun, Mar 21, 2021 at 10:53:39AM +0100, Micha?? Majchrowicz wrote: > > Incremental mode follows patterns seen in the passwords it was trained > > on. The supplied .chr files were trained on RockYou. If your patterns > > are similar, they should work well. If your patterns are very > > different, you'll need to re-train on those for it to work well. > That's what I want to check and what I fear is the issue. Training at > the moment would be hard as I don't have many of those hashes. I think > I first would have to generate some pseudo-random set. I suggest you start by seeing how the pre-existing .chr files perform. In fact, start with the default ascii.chr without restrictions. Then for specific patterns you want JtR to focus on, you can grep the RockYou list leaving only passwords matching those patterns. Generate a .chr file from that. See how it performs. Adjust the patterns you grep for, and repeat. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.