|
Full Disclosure
mailing list archives
Re: Large password list
From: xD 0x41 <secn3t () gmail com>
Date: Mon, 5 Dec 2011 20:55:34 +1100
Any specific dictionary file/collection work best for you,and was wpa
involved, ifso, wich list was best there.. just, somuch to download
there..like 15gig :s i would rather hone in on the effective one :)
thanks mate!
drew
On 5 December 2011 19:28, Alessandro Tagliapietra
<tagliapietra.alessandro () gmail com> wrote:
Get g0tmi1k's password list, for me there is lot of work behind and i've
found that working fine ;)
http://g0tmi1k.blogspot.com/2011/06/dictionaries-wordlists.html
Regards
2011/12/2 Charles Morris <cmorris () cs odu edu>
Of course, you are quite right, it follows,
and it's been many years since I've used anything less than 512 bits
with strong internal state for anything relevant.
Still...
On Fri, Dec 2, 2011 at 2:30 PM, Gage Bystrom <themadichib0d () gmail com>
wrote:
I think it simply makes sense though. As more and more common passwords
are
cracked by the multitude of boxes out there dedicated to cracking
hashes,
the more and more likely that its gunna turn up in a list or a site
somewhere. Add in that Google is really good at finding long strings and
numbers if they exist on the net and the fact that the entire idea
behind
hashes is for them to be unique....yeah.....
On Dec 2, 2011 11:17 AM, "Charles Morris" <cmorris () cs odu edu> wrote:
This is extremely depressing.
On Fri, Dec 2, 2011 at 2:14 PM, Jeffrey Walton <noloader () gmail com>
wrote:
On Thu, Dec 1, 2011 at 10:59 PM, Sanguinarious Rose
<SanguineRose () occultusterra com> wrote:
I am at a lack of words for this, why pay $4.99 when you can just do
some simple googling? You can even search pastebin and get a mass
collection of password lists from dbases. Add a dash of awk and
maybe
a pinch of sed and viola!
Why even spend the CPU cycles to process the password list? See Jon
Callas' post on the Random Bits mailing list: "No one bothers
cracking
the crypto (real life edition)",
http://lists.randombit.net/pipermail/cryptography/2011-December/001870.html.
Interestingly (sadly?), googling the hash worked quite well for me on
a number of test cases, including common words and proper names.
Jeff
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
- Re: Large password list, (continued)
Re: Large password list Sanguinarious Rose (Dec 02)
Re: Large password list GloW - XD (Dec 02)
|