3Mill Password Dictionary
Hi All! I have recently compiled a HUGE dictionary spanning over 3 Mill passwords.
Password dictionaries are used in brute forcing with programs such as John the Ripper, THC-Hydra, etc.
To use them, please add a comment below saying you want a tutorial on how to use password dictionaries and which programs.
The file is concealed in a *.zip file at about 54MB. After download, extract the files and you’re done! But I have to warn you, ‘password.txt’ WILL lag your computer if opened, proceed with caution if you want to add more to the file. Thanks.
DL: 3Mill Password Dictionary
[No Viruses]
As always, Sail Safe.
~|=|20/|\|/4|210|25 (Fromwarriors)
Sail Safe.
Donations if possible: 1Cv4FrNBBF3LLjg6ceBBQQomKRTmzPNPFJ
“If you can’t explain it simply, you don’t understand it well enough.”
Crunch is a good little program, I used it before to generate a UK SKY router password list (every password used to be 8 letters long and all caps). The only problem was it took up 1.7TB when complete :/ worked though :D
Crunch usage:
./crunch <min> <max> [options]
where min and max are numbers
So to create a password file of all 4 digit pins you would do
./crunch 4 4 1234567890
As default it will output the results to the terminal, to save to a file just add -o filename.txt
./crunch 4 4 1234567890 -o filename.txt
I would love to change the world, but they won’t give me the source code.
Sail Safe.
Donations if possible: 1Cv4FrNBBF3LLjg6ceBBQQomKRTmzPNPFJ
when the time has come , I shall rise and conquer the world
EEEEE EEEEE EEEEE EEEEE EEEEE EEE
E E E E E EEE
EEE EEE EEE EEE EEE EE
E E E E E
EEEEE EEEEE EEEEE EEEEE EEEEE @
There are 10 types of people in the world: Those who understand binary, and those who don’t
EEEEE EEEEE EEEEE EEEEE EEEEE EEE
E E E E E EEE
EEE EEE EEE EEE EEE EE
E E E E E
EEEEE EEEEE EEEEE EEEEE EEEEE @
I posted the Linux version of the tutorial I promised. –> Hacking >> tutorials and articles >> Dictionary Cracking[…]. Have fun!
Sail Safe.
Donations if possible: 1Cv4FrNBBF3LLjg6ceBBQQomKRTmzPNPFJ
If you’re looking for password files, then insidepro.com is a really good resource. I think it was already mentioned in some other thread…
- daMage
Yea, this is one I compiled myself though into an all-in-one package. I’m trying to exceed 12mil in future updates :)
Sail Safe.
Donations if possible: 1Cv4FrNBBF3LLjg6ceBBQQomKRTmzPNPFJ
Humm, that’s a big list… on the other hand, if I remember correctly, insidepros hashkiller list alone has over 23 million words. And that’s not the only list they have :)
It’s not only the size that counts… for example, if you know that the target is Spanish, then use Spanish word list etc..
- daMage
There is a website that has a list you can pay for, but I want this list for the general public. Knowledge is free ;)
Sail Safe.
Donations if possible: 1Cv4FrNBBF3LLjg6ceBBQQomKRTmzPNPFJ
- daMage
Sail Safe.
Donations if possible: 1Cv4FrNBBF3LLjg6ceBBQQomKRTmzPNPFJ
It depends. If you want a quick check, then you should questimate what words you should try. If there are no restrictions to the timeframe, then it helps to have them all in 1 file. Then again, you can run the attack using many dictionary files too, but it requires a bit more effort…
- daMage
Exactly, I use this file also for my own purposes. So it is a convenient to me and other people(I hope). Hacking is all about finding loopholes ;) but of course I have separate files for like 1000 most common words and whatnot. Oh, and I have a quick question on rainbow tables… How would you use them. I heard it is faster than brute force attack and is more effective. Any pointers to put me in the right direction so I know how and why to choose between those methods. My hypothesis is that rainbow tables are mostly used for SHA-1 encryptions where it is harder to crack it opposed to the common MD5 encryption. I will have to test them in my own time which is faster to crack via brute force: MD5 or SHA-1. But I’m beside the point, anyways hope you can answer my question. Thanks :).
Sail Safe.
Donations if possible: 1Cv4FrNBBF3LLjg6ceBBQQomKRTmzPNPFJ