12-23-2023, 02:07 PM
If I am not mistaken, when some new database gets breached and password hashes are obtained, people try to first crack the hashes using passwords from previous databreaches. Sometimes this works because some people reuse their password or some people just choose the same password because humans are not very good at generating random data, and exactly because of that, I think AI might be able to pick up on whatever pattern there is in human generated passwords.
A tool like makemore seems to be able to do just that. So my question is, if wordlist "A" is used to crack hashlist "B" and it successfully cracks "p" percent of hashes, is synthetically augmented wordlist "A*" with size 1.5 or 2x of wordlist "A" going to improve the "p" percent and by how much.
A tool like makemore seems to be able to do just that. So my question is, if wordlist "A" is used to crack hashlist "B" and it successfully cracks "p" percent of hashes, is synthetically augmented wordlist "A*" with size 1.5 or 2x of wordlist "A" going to improve the "p" percent and by how much.

I know what you're saying though and I agree that often brains is better than brawn but with something as relatively unpredictable as passwords, it's simply just a very difficult thing to predict. You're not just guessing what someone will choose, you're searching an almost random space of billions of people's brain RNGs. There isn't a pattern between one person to another, you just have to crush your own way through it. You're absolutely welcome to experiment with the many models out there, though and I'll have to add it to my own to-do list