Low recovered number of linkedin hashes
#1
Hi,

I recovered 'only' 332 000 hashes on the 6.5M from linkedin leak.
I 'only' use a good dictionnary + 10 000 rules.

Is anybody here recovered more ? If yes, which method ?
In order to benchmark my dictionnary and rules.


Thanks.
#2
A good dictionary would get you around 50% cracked, and those aren't near enough rules.

http://securitynirvana.blogspot.com/2012...-leak.html
#3
I would recommend trying different dictionaries. Analyze what you have cracked and look for patterns then run a mask with that. Rules are not the end all be all, sometimes you just have to run a mask that your gut tells you will be good.
#4
also remember to use the special version to crack the masked hashes, too
#5
(07-15-2012, 10:24 AM)epixoip Wrote: A good dictionary would get you around 50% cracked, and those aren't near enough rules.
http://securitynirvana.blogspot.com/2012...-leak.html
Interesting reading. My dictionnary does not seem very powerful !
Someone knows where I can find the quoted dictionnary ?

(07-15-2012, 12:06 PM)atom Wrote: also remember to use the special version to crack the masked hashes, too

Exact, I've just downloaded it. I'll try again.
#6
(07-15-2012, 05:13 PM)Mem5 Wrote: Interesting reading. My dictionnary does not seem very powerful !
Someone knows where I can find the quoted dictionnary ?

Most people aren't going to share their dictionaries. There are plenty of amazing resources that have plenty of amazing dictionaries so that you can start your own. Anytime you recover a pass via rules, bruteforce, etc., it should be saved and added to your collection.
#7
There is a good selection here.

Smile
#8
Yes, I traveled on this thread and many websites dealing with dictionnary, and I've made mine, and yes I add each pass I recover Smile