Very true... most hashes like, 'lol' and such, are usually around,
12345 is, all the main weak ones are google'able...
I do like people like openwall.com, BUT, they do A. contribute BACK to
community through owl linux, and, provide lists free, you can
optionally buy 700megs for about 20bux, I know i did buy theyre cd, so
im guilty of supporting owlOS , and tho, we are also speaking 700megs,
and access to gigabytes of lists here... 4bux for 20megs is a joke :P



On 3 December 2011 06:14, Jeffrey Walton <noloa...@gmail.com> wrote:
> On Thu, Dec 1, 2011 at 10:59 PM, Sanguinarious Rose
> <sanguiner...@occultusterra.com> wrote:
>> I am at a lack of words for this, why pay $4.99 when you can just do
>> some simple googling? You can even search pastebin and get a mass
>> collection of password lists from dbases. Add a dash of awk and maybe
>> a pinch of sed and viola!
>>
> Why even spend the CPU cycles to process the password list? See Jon
> Callas' post on the Random Bits mailing list: "No one bothers cracking
> the crypto (real life edition)",
> http://lists.randombit.net/pipermail/cryptography/2011-December/001870.html.
>
> Interestingly (sadly?), googling the hash worked quite well for me on
> a number of test cases, including common words and proper names.
>
> Jeff
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to