(09-10-2013, 01:17 AM)Sc00bz Wrote: Without knowing what you are doing, I'd suggest removing the last character from all the words in the word list. Sort and remove duplicates. Then do a hybrid attack to add the last character back in. This should get speeds closer to 1B/sec. Now if removing the last character doesn't actually remove like 90% of the passwords in your list, then it's not going to be much of a help.
How did you generate the 2^32 passwords? Are they all like Aaaa000! or something? If they are then you can do a mask attack.
That's an interesting suggest. But not really helps in my situation. Cutting password and running `sort -u` resulted in shortening testing wordlist from 94,967,295 to 94,966,065
Password list was generated using rand php function. Due to technical restrictions there are only 2^32 possible passwords. Here is an example:
Code:
BHwERtKm
6PSfGlqR
KHFWcxfg
Fno3gSLJ
1Ej4EUqw
QEp8L2Ry
RhOiuDqL
hceJvycQ
X9Tyrve7
l7QXg8nM