Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 16 Jun 2006 20:51:15 +0300
From: Pietari Kivikangas <JTR1998@...l.ru>
To: john-users@...ts.openwall.com
Subject: Re:  Inverted chatsets?

I'm not Solar, but i'll answer

Phantom wrote:
> Hey Solar
>
> Was wondering if you would consider an option/switch for creating 
> "inverted charsets" using the opposite of the algorithm used to create the 
> default charsets.
>   
The algorithm opposite to the one used to create the charset file is the 
algorithm used to generate password candidates.

> Consider the following scenario:
> a passfile with e.g. 1000 hashes.
> You have run -single mode, wordlist mode, wordlist -rules and have run the 
> different incremental modes for several days/weeks/months...
>
> After all these runs, you still have 50-100 hashes left that have not yet been 
> decrypted.
> So it might be, that since you have tried the conventional methods, and they 
> have stopped beeing efficient, it might be that these last hashes have 
> passwords that do NOT follow the conventional patterns and therefor it will take
>  very long  to hit them with normal charsets.
>   
How would you know that? There's no time limit for incremental mode. You 
can potentially get a suitable password candidate in, for example, 5 
years and it will look like these:
0065aM>
0065aH>
0065a >
0065aP>
0065aB>
0065a%>
0065a^>

> However, if one were to attack them using charsets that are the inverted or 
> opposite  of the default created ones, one might get faster hits on these 
> leftover hashes?
>   
By definition, a charset file inverted to the original one is such 
charset which can be used to produce ALL password candidates EXCEPT for 
those which can be produced using the original charset file.

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ