Git Product home page Git Product logo

Comments (6)

berzerk0 avatar berzerk0 commented on May 20, 2024

Thanks for bringing this up, I had thought about it and then forgotten about it again.

This doesn't fit the 'most popular' idea a full 100%. I'd say it fits it 75%, however.

My thinking is this:
When you mutate a password, especially a common one, you're LIKELY to create a common password.
It's not as guaranteed to be likely as if it were located frequently amongst password wordlists, but it is a solid second line of defense once you've exhausted the full list.
And if my understanding of hashcat is correct, if you run the Un-mutated list first, it'll remember your attempts on the hash file and therefore skip over any mutations you create in your second pass that uses rules.

Secondly, isn't it less computationally expensive to use a premade list that includes mutations than to generate them yourself while simultaneously cracking? This is not a rhetorical question, I am pretty new to this.

Long story short - Yes

...but isn't at the top of the priority list. I'd say it's most likely to come in after 2.0 but if working on 2.0 gets boring I'll work on it after 1.1

Edit - "Yes" became "No" after discussion and thought

Edit: or after 1.2

from probable-wordlists.

berzerk0 avatar berzerk0 commented on May 20, 2024

Now you've got me thinking about it in more depth.
So you'd want, let's say, the top 125thousand, 'purified' into something resembling dictionary words and strings of numbers?

That means de-1337-ifying, taking out leading and trailing symbols and numbers (if it is word based), etc?

from probable-wordlists.

dogfud avatar dogfud commented on May 20, 2024

I think it really depends on the practical use case you are trying to support with the list, because really they are quite different from each other:

One would be an online brute-force authentication attack. For this you want an inclusive list of words, sorted by likelihood of use. This could be useful for attacking a single identity, or alternatively if the identities are enumerable then "trolling" for accounts with common passwords. Either way, rules probably not used, and besides John or Hashcat could be used to compute those from a base list if needed.

Second use case is an off-line brute force attack on a password hash. This is the use case I was speaking to because it probably does include rules-based munging, and to that end would gain some efficiencies by weeding out the redundant base words.

from probable-wordlists.

dogfud avatar dogfud commented on May 20, 2024

You know, the more I chew on this I'm starting to think you are on the right track already, and that anybody using rules should just as well come up with their own regex filters to weed out the "noise" apropos of the specific rules they intend to apply.

Thanks anyway for entertaining the idea ;)

from probable-wordlists.

Lexus89 avatar Lexus89 commented on May 20, 2024

Perhaps this can be of use: https://github.com/digininja/deleet/tree/tuning

from probable-wordlists.

berzerk0 avatar berzerk0 commented on May 20, 2024

Decided to have this functionality implemented through use of third-party software.

Check out https://thesprawl.org/projects/pack for this kind of functionality.

from probable-wordlists.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.