Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CABob6irP4CQ-e9puU3D9VCsb1s10RLrn--B8KAwDB-UVjLxebQ@mail.gmail.com>
Date: Wed, 10 Dec 2014 04:20:53 +0100
From: Lukas Odzioba <lukas.odzioba@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: PRINCE approach from hashcat

2014-12-10 4:01 GMT+01:00 Royce Williams <royce@...ho.org>:
> What's hashcat up to here?  I only skimmed the PDF briefly.
>
>     https://hashcat.net/tools/princeprocessor/

For me it looks like combinator attack generalized to a given final
password length.

> – Generate password with chain

It is not covered in the presentation but I assume it is string
concatenation, but there could be some additional rule engine to build
passwords from n "roots" or "base word sets", this in some cases would
break chain length limit which I guess might be some kind of
optimization.

I like the idea, and it is good to see that someone is still working
on new methods.

Lukas

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.