Creating a brute force “profile” based on past passwords












0















When attempting to brute force a password it can be helpful to minimize the time it needs by applying something like "mixed attacks". This question is mainly about optimizing such a mixed attack.



I have a bitlocker encrypted hard drive and a tool to brute force the hard drive. This isn't malicious intent, just a loss of the password/recovery key and I'm trying to brute force myself out of curiosity.



I am wondering how I can create a profile to be used for the brute that is based on past/previous known passwords.



The unknown password is 8 characters long, is based on a dictionary word and mixes capitalization. It also includes numbers and some characters might be exchanged by symbols. (like a or A as @)



That's the basis I would use for the tool.



Now I'd like to add something more personalized on top by analyzing what I've used before and use that to optimize the basis.



For example (these are not a list of my past passwords) I might have used those in the past:



p@ssw0rd
P@ßßw0rD
P@$$w0rD
cr@ck3nt3r



How can I approach this brute force optimization?



Do I create a dictionary with the list of past passwords?



Can I create a dictionary with that list which includes slight variations of it?



Any other suggestions towards optimizing this based on personal profiles?










share|improve this question

























  • If this is Windows, and encryption (EFS) isn’t being used there are easier ways, then a brute force attacking the profile.

    – Ramhound
    Feb 13 at 2:47











  • Yes it's windows and it's about BitLocker, so I think it's encrypted (that's the point I suppose).. What other ways are you referring to?

    – HackXIt
    Feb 19 at 22:03











  • Your question makes absolutely no mention of BitLocker or EFS being used

    – Ramhound
    Feb 19 at 22:29











  • I've edited it accordingly

    – HackXIt
    Feb 21 at 11:03
















0















When attempting to brute force a password it can be helpful to minimize the time it needs by applying something like "mixed attacks". This question is mainly about optimizing such a mixed attack.



I have a bitlocker encrypted hard drive and a tool to brute force the hard drive. This isn't malicious intent, just a loss of the password/recovery key and I'm trying to brute force myself out of curiosity.



I am wondering how I can create a profile to be used for the brute that is based on past/previous known passwords.



The unknown password is 8 characters long, is based on a dictionary word and mixes capitalization. It also includes numbers and some characters might be exchanged by symbols. (like a or A as @)



That's the basis I would use for the tool.



Now I'd like to add something more personalized on top by analyzing what I've used before and use that to optimize the basis.



For example (these are not a list of my past passwords) I might have used those in the past:



p@ssw0rd
P@ßßw0rD
P@$$w0rD
cr@ck3nt3r



How can I approach this brute force optimization?



Do I create a dictionary with the list of past passwords?



Can I create a dictionary with that list which includes slight variations of it?



Any other suggestions towards optimizing this based on personal profiles?










share|improve this question

























  • If this is Windows, and encryption (EFS) isn’t being used there are easier ways, then a brute force attacking the profile.

    – Ramhound
    Feb 13 at 2:47











  • Yes it's windows and it's about BitLocker, so I think it's encrypted (that's the point I suppose).. What other ways are you referring to?

    – HackXIt
    Feb 19 at 22:03











  • Your question makes absolutely no mention of BitLocker or EFS being used

    – Ramhound
    Feb 19 at 22:29











  • I've edited it accordingly

    – HackXIt
    Feb 21 at 11:03














0












0








0








When attempting to brute force a password it can be helpful to minimize the time it needs by applying something like "mixed attacks". This question is mainly about optimizing such a mixed attack.



I have a bitlocker encrypted hard drive and a tool to brute force the hard drive. This isn't malicious intent, just a loss of the password/recovery key and I'm trying to brute force myself out of curiosity.



I am wondering how I can create a profile to be used for the brute that is based on past/previous known passwords.



The unknown password is 8 characters long, is based on a dictionary word and mixes capitalization. It also includes numbers and some characters might be exchanged by symbols. (like a or A as @)



That's the basis I would use for the tool.



Now I'd like to add something more personalized on top by analyzing what I've used before and use that to optimize the basis.



For example (these are not a list of my past passwords) I might have used those in the past:



p@ssw0rd
P@ßßw0rD
P@$$w0rD
cr@ck3nt3r



How can I approach this brute force optimization?



Do I create a dictionary with the list of past passwords?



Can I create a dictionary with that list which includes slight variations of it?



Any other suggestions towards optimizing this based on personal profiles?










share|improve this question
















When attempting to brute force a password it can be helpful to minimize the time it needs by applying something like "mixed attacks". This question is mainly about optimizing such a mixed attack.



I have a bitlocker encrypted hard drive and a tool to brute force the hard drive. This isn't malicious intent, just a loss of the password/recovery key and I'm trying to brute force myself out of curiosity.



I am wondering how I can create a profile to be used for the brute that is based on past/previous known passwords.



The unknown password is 8 characters long, is based on a dictionary word and mixes capitalization. It also includes numbers and some characters might be exchanged by symbols. (like a or A as @)



That's the basis I would use for the tool.



Now I'd like to add something more personalized on top by analyzing what I've used before and use that to optimize the basis.



For example (these are not a list of my past passwords) I might have used those in the past:



p@ssw0rd
P@ßßw0rD
P@$$w0rD
cr@ck3nt3r



How can I approach this brute force optimization?



Do I create a dictionary with the list of past passwords?



Can I create a dictionary with that list which includes slight variations of it?



Any other suggestions towards optimizing this based on personal profiles?







security passwords brute-force






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Feb 21 at 11:03







HackXIt

















asked Feb 12 at 22:00









HackXItHackXIt

134




134













  • If this is Windows, and encryption (EFS) isn’t being used there are easier ways, then a brute force attacking the profile.

    – Ramhound
    Feb 13 at 2:47











  • Yes it's windows and it's about BitLocker, so I think it's encrypted (that's the point I suppose).. What other ways are you referring to?

    – HackXIt
    Feb 19 at 22:03











  • Your question makes absolutely no mention of BitLocker or EFS being used

    – Ramhound
    Feb 19 at 22:29











  • I've edited it accordingly

    – HackXIt
    Feb 21 at 11:03



















  • If this is Windows, and encryption (EFS) isn’t being used there are easier ways, then a brute force attacking the profile.

    – Ramhound
    Feb 13 at 2:47











  • Yes it's windows and it's about BitLocker, so I think it's encrypted (that's the point I suppose).. What other ways are you referring to?

    – HackXIt
    Feb 19 at 22:03











  • Your question makes absolutely no mention of BitLocker or EFS being used

    – Ramhound
    Feb 19 at 22:29











  • I've edited it accordingly

    – HackXIt
    Feb 21 at 11:03

















If this is Windows, and encryption (EFS) isn’t being used there are easier ways, then a brute force attacking the profile.

– Ramhound
Feb 13 at 2:47





If this is Windows, and encryption (EFS) isn’t being used there are easier ways, then a brute force attacking the profile.

– Ramhound
Feb 13 at 2:47













Yes it's windows and it's about BitLocker, so I think it's encrypted (that's the point I suppose).. What other ways are you referring to?

– HackXIt
Feb 19 at 22:03





Yes it's windows and it's about BitLocker, so I think it's encrypted (that's the point I suppose).. What other ways are you referring to?

– HackXIt
Feb 19 at 22:03













Your question makes absolutely no mention of BitLocker or EFS being used

– Ramhound
Feb 19 at 22:29





Your question makes absolutely no mention of BitLocker or EFS being used

– Ramhound
Feb 19 at 22:29













I've edited it accordingly

– HackXIt
Feb 21 at 11:03





I've edited it accordingly

– HackXIt
Feb 21 at 11:03










1 Answer
1






active

oldest

votes


















0














I've done something similar after mis-typing a password. I used exrex to generate a list from the possible substitutions, by a regex.



You might run something like this to generate all possible variants of a dictionary word. For example, you may wish to run it with the regex [Pp][aA@][sS$ß]{2}[wW][0oO][rR][dD]



To generalise, you might want to script this to do such replacements for all of /usr/dict or some other dictionary files, doing a replacement for each letter of [lowerUPPER], with additional specific cases (like o) having 0 added.



Outputting this to a file will give you a specific list of passwords to try.






share|improve this answer
























  • I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.

    – HackXIt
    Feb 19 at 22:05











  • That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.

    – HackXIt
    Mar 5 at 12:39











  • Glad to have helped

    – BlueDrink9
    Mar 6 at 7:22











Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "3"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1405027%2fcreating-a-brute-force-profile-based-on-past-passwords%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









0














I've done something similar after mis-typing a password. I used exrex to generate a list from the possible substitutions, by a regex.



You might run something like this to generate all possible variants of a dictionary word. For example, you may wish to run it with the regex [Pp][aA@][sS$ß]{2}[wW][0oO][rR][dD]



To generalise, you might want to script this to do such replacements for all of /usr/dict or some other dictionary files, doing a replacement for each letter of [lowerUPPER], with additional specific cases (like o) having 0 added.



Outputting this to a file will give you a specific list of passwords to try.






share|improve this answer
























  • I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.

    – HackXIt
    Feb 19 at 22:05











  • That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.

    – HackXIt
    Mar 5 at 12:39











  • Glad to have helped

    – BlueDrink9
    Mar 6 at 7:22
















0














I've done something similar after mis-typing a password. I used exrex to generate a list from the possible substitutions, by a regex.



You might run something like this to generate all possible variants of a dictionary word. For example, you may wish to run it with the regex [Pp][aA@][sS$ß]{2}[wW][0oO][rR][dD]



To generalise, you might want to script this to do such replacements for all of /usr/dict or some other dictionary files, doing a replacement for each letter of [lowerUPPER], with additional specific cases (like o) having 0 added.



Outputting this to a file will give you a specific list of passwords to try.






share|improve this answer
























  • I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.

    – HackXIt
    Feb 19 at 22:05











  • That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.

    – HackXIt
    Mar 5 at 12:39











  • Glad to have helped

    – BlueDrink9
    Mar 6 at 7:22














0












0








0







I've done something similar after mis-typing a password. I used exrex to generate a list from the possible substitutions, by a regex.



You might run something like this to generate all possible variants of a dictionary word. For example, you may wish to run it with the regex [Pp][aA@][sS$ß]{2}[wW][0oO][rR][dD]



To generalise, you might want to script this to do such replacements for all of /usr/dict or some other dictionary files, doing a replacement for each letter of [lowerUPPER], with additional specific cases (like o) having 0 added.



Outputting this to a file will give you a specific list of passwords to try.






share|improve this answer













I've done something similar after mis-typing a password. I used exrex to generate a list from the possible substitutions, by a regex.



You might run something like this to generate all possible variants of a dictionary word. For example, you may wish to run it with the regex [Pp][aA@][sS$ß]{2}[wW][0oO][rR][dD]



To generalise, you might want to script this to do such replacements for all of /usr/dict or some other dictionary files, doing a replacement for each letter of [lowerUPPER], with additional specific cases (like o) having 0 added.



Outputting this to a file will give you a specific list of passwords to try.







share|improve this answer












share|improve this answer



share|improve this answer










answered Feb 13 at 2:42









BlueDrink9BlueDrink9

336111




336111













  • I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.

    – HackXIt
    Feb 19 at 22:05











  • That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.

    – HackXIt
    Mar 5 at 12:39











  • Glad to have helped

    – BlueDrink9
    Mar 6 at 7:22



















  • I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.

    – HackXIt
    Feb 19 at 22:05











  • That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.

    – HackXIt
    Mar 5 at 12:39











  • Glad to have helped

    – BlueDrink9
    Mar 6 at 7:22

















I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.

– HackXIt
Feb 19 at 22:05





I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.

– HackXIt
Feb 19 at 22:05













That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.

– HackXIt
Mar 5 at 12:39





That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.

– HackXIt
Mar 5 at 12:39













Glad to have helped

– BlueDrink9
Mar 6 at 7:22





Glad to have helped

– BlueDrink9
Mar 6 at 7:22


















draft saved

draft discarded




















































Thanks for contributing an answer to Super User!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1405027%2fcreating-a-brute-force-profile-based-on-past-passwords%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

flock() on closed filehandle LOCK_FILE at /usr/bin/apt-mirror

Mangá

 ⁒  ․,‪⁊‑⁙ ⁖, ⁇‒※‌, †,⁖‗‌⁝    ‾‸⁘,‖⁔⁣,⁂‾
”‑,‥–,‬ ,⁀‹⁋‴⁑ ‒ ,‴⁋”‼ ⁨,‷⁔„ ‰′,‐‚ ‥‡‎“‷⁃⁨⁅⁣,⁔
⁇‘⁔⁡⁏⁌⁡‿‶‏⁨ ⁣⁕⁖⁨⁩⁥‽⁀  ‴‬⁜‟ ⁃‣‧⁕‮ …‍⁨‴ ⁩,⁚⁖‫ ,‵ ⁀,‮⁝‣‣ ⁑  ⁂– ․, ‾‽ ‏⁁“⁗‸ ‾… ‹‡⁌⁎‸‘ ‡⁏⁌‪ ‵⁛ ‎⁨ ―⁦⁤⁄⁕