Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140206154513.GA395@openwall.com>
Date: Thu, 6 Feb 2014 19:45:13 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: questions about Incremental attack

On Thu, Feb 06, 2014 at 10:29:39AM +0100, JohnyKrekan wrote:
> Hello, I would like to ask what mathematical principles are used in John's Incremental attack
> I use John to generate potential passwords for testing WPA PSK network's security.
> I have generated my own chr file from my wordlist and then use
> john -i=alpha --stdout 
> (I replaced standard alpha with my own)
> to generate those candidates which are very useful.
> My questions are:
> 1. What mathematical method is used to generate the chr file from the wordlist? Where could I read more about that?

I'm afraid the best place is charset.c in the source tree.  It does have
some comments.

> 2. What is the algorithm which is used to generate the potential candidates using this table?

I'm afraid the best "description" is inc.c, especially inc_key_loop().
It is not commented, but it is not very complicated.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.