Nmap Development mailing list archives

Re: Replacing passwords.lst


From: Brandon Enright <bmenrigh () ucsd edu>
Date: Thu, 4 Mar 2010 22:27:16 +0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[...]

I think the passwords leaked by Rockyou.com are indicative of what
typical passwords look like, and we should therefore replace Nmap's
password.lst file with a version generated from Rockyou.com. 

Thoughts?


Ron, what percentage of the PHPBB password would we crack with the
current 200 versus your new suggested 200?  Do we see a similar
increase?

Brandon

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.14 (GNU/Linux)

iEYEARECAAYFAkuQM84ACgkQqaGPzAsl94IaDACbBsOyLQiXpnoyFClRaPSBy1h2
1IcAmgIGl2eLOamJz7S0piBqS6VDalT8
=3krT
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: