Hi,
I recovered 'only' 332 000 hashes on the 6.5M from linkedin leak.
I 'only' use a good dictionnary + 10 000 rules.
Is anybody here recovered more ? If yes, which method ?
In order to benchmark my dictionnary and rules.
Thanks.
I would recommend trying different dictionaries. Analyze what you have cracked and look for patterns then run a mask with that. Rules are not the end all be all, sometimes you just have to run a mask that your gut tells you will be good.
also remember to use the special version to crack the masked hashes, too
(07-15-2012, 10:24 AM)epixoip Wrote: [ -> ]A good dictionary would get you around 50% cracked, and those aren't near enough rules.
https://securitynirvana.blogspot.com/2012...-leak.html
Interesting reading. My dictionnary does not seem very powerful !
Someone knows where I can find the quoted dictionnary ?
(07-15-2012, 12:06 PM)atom Wrote: [ -> ]also remember to use the special version to crack the masked hashes, too
Exact, I've just downloaded it. I'll try again.
(07-15-2012, 05:13 PM)Mem5 Wrote: [ -> ]Interesting reading. My dictionnary does not seem very powerful !
Someone knows where I can find the quoted dictionnary ?
Most people aren't going to share their dictionaries. There are plenty of amazing resources that have plenty of amazing dictionaries so that you can start your own. Anytime you recover a pass via rules, bruteforce, etc., it should be saved and added to your collection.
There is a good selection
here.
Yes, I traveled on this thread and many websites dealing with dictionnary, and I've made mine, and yes I add each pass I recover