How to optimize speed or setup
#8
(10-12-2016, 12:37 PM)kiara Wrote: if u know ur password why u wana recover it..

anyway, its totaly normal, u adding 3 chars that mean 12 chars overwall the keyspace will get bigger..,

what command are u using, and why would u add 3 char if u know ur pw?
i dont get it

I need to know how long would it take to get my password. I am just learning the process of recovering passwords. Even if I did not know the password with access to the server it is a matter of 12 sec to change to password.

(10-12-2016, 08:24 PM)epixoip Wrote: Welcome to the exponential wall of brute force. If you're going to make a habit of this, you should learn math.

Sarcasm is always very helpful. I understand the math, that is why I am asking for help with better option. Since simple brute force can not do the trick.

(10-14-2016, 11:31 AM)root2 Wrote: Hi,
if you want to be faster than bruteforce (e.g., because it is a very slow hash) you should have a look at probabilistic password models. A good starting point is "A Study of Probabilistic Password Models (SP '14)".

Here you can find the 3 most used alternatives to bruteforce:

## Probabilistic Context-Free Grammars
-> Password Cracking Using Probabilistic Context-Free Grammars (SP '09)
-> Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms (SP '12)
-> Effect of Grammar on Security of Long Passwords (CODASPY '13)
-> On the Semantic Patterns of Passwords and their Security Impact (NDSS '14)
-> Next Gen PCFG Password Cracking (TIFS '15)
---> Software (old): https://sites.google.com/site/reusablese...ic_cracker
---> Software (new): https://github.com/lakiw/pcfg_cracker

## Markov Models
-> Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff (CCS '05)
-> OMEN: Faster Password Guessing Using an Ordered Markov Enumerator (ESSoS '15)
-> OMEN+: When Privacy meets Security: Leveraging personal information for password cracking (CoRR '13)
-> A Study of Probabilistic Password Models (SP '14)
---> Software (old): http://openwall.info/wiki/john/markov
---> Software (new): https://github.com/RUB-SysSec/Password-G...-Framework (OMEN will be published very soon)

## Neural Networks
-> Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks (USENIX '16)
-> (A rather strange approach, but the ?FIRST? writing about this topic) Using neural networks for password cracking by Sebastian Neef
--> Software (old): https://github.com/gehaxelt/RNN-Passwords
--> Software (new): https://github.com/cupslab/neural_network_cracking

## Approach Comparison
-> Measuring Real-World Accuracies and Biases in Modeling Password Guessability (USENIX '15)
-> A Framework for Comparing Password Guessing Strategies (PASSWORDS '15)

## Hybrids
-> Introducing the PRINCE attack-mode (PASSWORDS '14)
---> Software: https://github.com/hashcat/princeprocessor
---> Software: https://github.com/hashcat/hashcat

Very good post, finally very good answer I will get right on it. Thank you very much.


Messages In This Thread
How to optimize speed or setup - by pepix - 10-12-2016, 08:52 AM
RE: How to optimize speed or setup - by kiara - 10-12-2016, 12:37 PM
RE: How to optimize speed or setup - by epixoip - 10-12-2016, 08:24 PM
RE: How to optimize speed or setup - by root2 - 10-14-2016, 11:31 AM
RE: How to optimize speed or setup - by atom - 10-15-2016, 10:12 AM
RE: How to optimize speed or setup - by root2 - 10-16-2016, 11:35 AM
RE: How to optimize speed or setup - by atom - 10-16-2016, 08:09 PM
RE: How to optimize speed or setup - by pepix - 10-17-2016, 09:49 AM