Wordlists on Kali Linux?

  • I notice that in /usr/share/wordlists in Kali Linux (former Backtrack) there are some lists. Are they used to bruteforce something? Is there specific list for specific kind of attacks?

    Fire up John the Ripper and see if you can crack some passwords with the provided list

  • GdD

    GdD Correct answer

    7 years ago

    Kali linux is a distribution designed for penetration testing and computer forensics, both which involve password cracking. So you are right in thinking that word lists are involved in password cracking, however it's not brute force.

    Brute force attacks try every combination of characters in order to find a password, while word lists are used in dictionary based attacks. Many people base their password on dictionary words, and word lists are used to supply the material for dictionary attacks. The reason you want to use dictionary attacks is that they are much faster than brute force attacks. If you have many passwords and you only want to crack one or two then this method can yield quick results, especially if the password hashes are from places where strong passwords are not enforced.

    Typical tools for password cracking (John the Ripper, ophtcrack, hashcat, etc) can do several types of attacks including:

    • Standard brute force: all combinations are tried until something matches. You tpyically use a character set common on the keyboards of the language used to type the passwords, or you can used a reduced set like alphanumneric plus a few symbols. the size of the character set makes a big difference in how long it takes to brute force a password. Password length also makes a big difference. This can take a very long time depending on many factors
    • Standard dictionary: straight dictionary words are used. It's mostly used to find really poor passwords, like password, password123, system, welcome, 123456, etc.
    • Dictionary attack with rules: in this type dictionary words are used as the basis for cracks, rules are used to modify these, for instance capitalizing the first letter, adding a number to the end, or replacing letters with numbers or symbols

    Rules attacks are likely the best bang for the buck if all you have are standard computing resources, although if you have GPUs available brute-force attacks can be made viable as long as the passwords aren't too long. It depends on the password length, hashing/salting used, and how much computing power you have at your disposal.

    Very nice answer @GdD, can't vote up im sorry .... Thanks for clarifying for me the diferrence between brute force and standard dictonary ... i thought they was the same .... And how the Rules on dic works ?

    @Stephenloky, the rules are applied by the cracking engines, each one is different in implementation. Some tools have more flexibility than others.

License under CC-BY-SA with attribution


Content dated before 6/26/2020 9:53 AM