Full Disclosure mailing list archives

Re: Large password list


From: GloW - XD <doomxd () gmail com>
Date: Sat, 3 Dec 2011 07:28:26 +1100

Very true... most hashes like, 'lol' and such, are usually around,
12345 is, all the main weak ones are google'able...
I do like people like openwall.com, BUT, they do A. contribute BACK to
community through owl linux, and, provide lists free, you can
optionally buy 700megs for about 20bux, I know i did buy theyre cd, so
im guilty of supporting owlOS , and tho, we are also speaking 700megs,
and access to gigabytes of lists here... 4bux for 20megs is a joke :P



On 3 December 2011 06:14, Jeffrey Walton <noloader () gmail com> wrote:
On Thu, Dec 1, 2011 at 10:59 PM, Sanguinarious Rose
<SanguineRose () occultusterra com> wrote:
I am at a lack of words for this, why pay $4.99 when you can just do
some simple googling? You can even search pastebin and get a mass
collection of password lists from dbases. Add a dash of awk and maybe
a pinch of sed and viola!

Why even spend the CPU cycles to process the password list? See Jon
Callas' post on the Random Bits mailing list: "No one bothers cracking
the crypto (real life edition)",
http://lists.randombit.net/pipermail/cryptography/2011-December/001870.html.

Interestingly (sadly?), googling the hash worked quite well for me on
a number of test cases, including common words and proper names.

Jeff

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: