Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <80d7e4091002031911g77a838e7x7d1ba3f7dbbb839f@mail.gmail.com>
Date: Wed, 3 Feb 2010 20:11:59 -0700
From: Stephen John Smoogen <smooge@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Replacement for all.chr based on "Rock You" 
	Passwords. URL inside.

On Wed, Feb 3, 2010 at 4:21 PM, Minga Minga <mingakore@...il.com> wrote:
> All,
>
> As you may know, there was a HUGE list of passwords recently revealed
> via a 3rd party web-site attack. This list contained approximately
> 32 million passwords. Numerous articles were made on the statistics
> of the passwords.  All the articles were fine and dandy, but not really
> impressive because the "research" done was as simple as 'sort | uniq'
> stuff.
>
> As a password cracking community, we CAN make use of this disclosure
> in order to make better dictionaries, but also to improve our brute
> forcing technique.
>
> I dont exactly remember how/when all.chr was created, and I have no
> idea the last time it was updated, but I propose we update it
> with a .CHR file from the 'RockYou' list mentioned above.

I would be a bit apprehensive to use 'just' the RockYou list as the
basis of the all.chr set. Yes it is a significant amount of passwords
but I would say that someone would need to see how it compares to the
older all.chr or a combined all.chr and such versus a sample set of
hashes to see 'better' it is. I am guessing that is the research your
group will be posting in the future.

> Now, I have many opinions about the passwords from the RockYou list.
> They are NOT representative of "real" passwords by trained users in
> corporate environments. But they ARE representative of idiots on the
> Internet. And I guess thats a good enough place to start, as any, for
> the default behaviour of JtR. I propose the all.chr update because we
> cannot continue to use and propagate a .CHR file that is so outdated
> (assuming it is?).
>
> Since the .chr created from the 'RockYou' list - can NOT be used
> to re-create the exact list of passwords, it is not a disclosure of
> personal information (up for debate). Therefore, I make the assumption
> it is safe for use.

Well you can't get the exact list used to create the original all.chr,
but you can create enough of the list by using  'john -i --stdout' to
hum a few bars. I would expect that it would be the same.


> As a note: The wordlist will not be revealed (nor the dictionaries
> created from it) by KoreLogic due to it's sensitive nature. If you
> have this list, please keep it private for the sake of all users
> of this Internet thing everyone is talking about ;)

I am pretty sure the list is sadly pretty much common knowledge now..
there are torrents and various sites have copies of it enough that
even I found a couple versions today :).

> Here is the CHR file, and the README associated with it including
> instructions for use, etc. If we don't want to replace all.chr -
> instructions are included for using rockyou.chr separately.
>
> http://www.korelogic.com/tools.html#jtr
>
> -Minga
> KoreLogic
>
>
> ------------
>
> Sample output of new .chr file:
>
> ~/.john$ ./john -i:all -stdout | more
> 1233
> 1990
> 1991
> 1920
> 1922
> 1231
> anana
> maran
> maras
> maris
> marie
>



-- 
Stephen J Smoogen.

Ah, but a man's reach should exceed his grasp. Or what's a heaven for?
-- Robert Browning

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.