Kali password dictionary
These hacking dictionaries are already present o Kali Linux. So we can safely use it without download anything.
RockYou (/usr/share/wordlists/rockyou) is the most popular pentest dictionary for any business. It can also be used for WiFi, but I recommend that you first clean up inappropriate passwords using the same pw-inspector.
So if you are using Kali Linux before you download any password dictionary you may check rockyou password list that comes in every kali Linux image.
You can use it to perform a dictionary attack, at least try the one you have before you download a new one.
Kali Linux provides some Password dictionary files as part of its standard installation named rockyou.txt.
you can find that file here :
/usr/share/wordlists/rockyou .txt.gz
if this one doesn’t work check the end of this article and you will find what you want.
but for now let’s check rockyou.txt.gz.
So let’s take a copy of rockyou.txt.gz to root directory
To do so write this command:
cp /usr/share/wordlists/rockyou .txt.gz .
Now to unzip rockyou wordlist type:
gunzip rockyou.txt.gz
you will get a new file rockyou.txt
To know how many passwords this file contains type:
wc -l rockyou.txt
The password inside this file include password’s with more and less then 8 characters
so if you want to use it for WPA2 Penetration Testing you should make a dictionary that contains passwords with minimum 8 characters so it becomes a wpa dictionary and Make sure you have a monitor mode wifi adapter that support WPA2 cracking
To do that type this command :
cat rockyou.txt | sort | uniq | pw-inspector -m 8 -M 63 > rockyoulist.txt
rockyoulist.txt contains 9606665 passwords that’s a huge list
I called mine rockyoulist.txt but maybe you should call it passwordlist.txt if you are making it for WiFi penetration or anything you want just remember it.
Password dictionary :
http://weakpass.com/
Password attacks can be divided into two large groups: a hash attack and an attempt to pick up a password for authentication. We will not dwell on their characteristics in detail. Since password dictionary attack is possible in both groups.
So we come to the most important thing – where to get the dictionaries. Different tasks require different dictionaries:
if we brute force login to a remote service, then we need not very large dictionaries, but with the most common usernames and passwords. This is due to the fact that most network services have a customized brute force protection. Those. so that our IP is not blocked by an automatic script, we must make a long interval between attempts. It will take a lot of time, so it makes sense to start only with the most popular sets of words;
Bruteforcing a Wi-Fi network password (in an intercepted handshake), we still need a high-quality dictionary with popular passwords, but the larger the dictionary, the better, especially if you have medium or strong hardware;
Enjoy 👍❤️
Newest
Older
Post a Comment
Post a Comment