Creating a brute force “profile” based on past passwords
When attempting to brute force a password it can be helpful to minimize the time it needs by applying something like "mixed attacks". This question is mainly about optimizing such a mixed attack.
I have a bitlocker encrypted hard drive and a tool to brute force the hard drive. This isn't malicious intent, just a loss of the password/recovery key and I'm trying to brute force myself out of curiosity.
I am wondering how I can create a profile to be used for the brute that is based on past/previous known passwords.
The unknown password is 8 characters long, is based on a dictionary word and mixes capitalization. It also includes numbers and some characters might be exchanged by symbols. (like a or A as @)
That's the basis I would use for the tool.
Now I'd like to add something more personalized on top by analyzing what I've used before and use that to optimize the basis.
For example (these are not a list of my past passwords) I might have used those in the past:
p@ssw0rd
P@ßßw0rD
P@$$w0rD
cr@ck3nt3r
How can I approach this brute force optimization?
Do I create a dictionary with the list of past passwords?
Can I create a dictionary with that list which includes slight variations of it?
Any other suggestions towards optimizing this based on personal profiles?
security passwords brute-force
add a comment |
When attempting to brute force a password it can be helpful to minimize the time it needs by applying something like "mixed attacks". This question is mainly about optimizing such a mixed attack.
I have a bitlocker encrypted hard drive and a tool to brute force the hard drive. This isn't malicious intent, just a loss of the password/recovery key and I'm trying to brute force myself out of curiosity.
I am wondering how I can create a profile to be used for the brute that is based on past/previous known passwords.
The unknown password is 8 characters long, is based on a dictionary word and mixes capitalization. It also includes numbers and some characters might be exchanged by symbols. (like a or A as @)
That's the basis I would use for the tool.
Now I'd like to add something more personalized on top by analyzing what I've used before and use that to optimize the basis.
For example (these are not a list of my past passwords) I might have used those in the past:
p@ssw0rd
P@ßßw0rD
P@$$w0rD
cr@ck3nt3r
How can I approach this brute force optimization?
Do I create a dictionary with the list of past passwords?
Can I create a dictionary with that list which includes slight variations of it?
Any other suggestions towards optimizing this based on personal profiles?
security passwords brute-force
If this is Windows, and encryption (EFS) isn’t being used there are easier ways, then a brute force attacking the profile.
– Ramhound
Feb 13 at 2:47
Yes it's windows and it's about BitLocker, so I think it's encrypted (that's the point I suppose).. What other ways are you referring to?
– HackXIt
Feb 19 at 22:03
Your question makes absolutely no mention of BitLocker or EFS being used
– Ramhound
Feb 19 at 22:29
I've edited it accordingly
– HackXIt
Feb 21 at 11:03
add a comment |
When attempting to brute force a password it can be helpful to minimize the time it needs by applying something like "mixed attacks". This question is mainly about optimizing such a mixed attack.
I have a bitlocker encrypted hard drive and a tool to brute force the hard drive. This isn't malicious intent, just a loss of the password/recovery key and I'm trying to brute force myself out of curiosity.
I am wondering how I can create a profile to be used for the brute that is based on past/previous known passwords.
The unknown password is 8 characters long, is based on a dictionary word and mixes capitalization. It also includes numbers and some characters might be exchanged by symbols. (like a or A as @)
That's the basis I would use for the tool.
Now I'd like to add something more personalized on top by analyzing what I've used before and use that to optimize the basis.
For example (these are not a list of my past passwords) I might have used those in the past:
p@ssw0rd
P@ßßw0rD
P@$$w0rD
cr@ck3nt3r
How can I approach this brute force optimization?
Do I create a dictionary with the list of past passwords?
Can I create a dictionary with that list which includes slight variations of it?
Any other suggestions towards optimizing this based on personal profiles?
security passwords brute-force
When attempting to brute force a password it can be helpful to minimize the time it needs by applying something like "mixed attacks". This question is mainly about optimizing such a mixed attack.
I have a bitlocker encrypted hard drive and a tool to brute force the hard drive. This isn't malicious intent, just a loss of the password/recovery key and I'm trying to brute force myself out of curiosity.
I am wondering how I can create a profile to be used for the brute that is based on past/previous known passwords.
The unknown password is 8 characters long, is based on a dictionary word and mixes capitalization. It also includes numbers and some characters might be exchanged by symbols. (like a or A as @)
That's the basis I would use for the tool.
Now I'd like to add something more personalized on top by analyzing what I've used before and use that to optimize the basis.
For example (these are not a list of my past passwords) I might have used those in the past:
p@ssw0rd
P@ßßw0rD
P@$$w0rD
cr@ck3nt3r
How can I approach this brute force optimization?
Do I create a dictionary with the list of past passwords?
Can I create a dictionary with that list which includes slight variations of it?
Any other suggestions towards optimizing this based on personal profiles?
security passwords brute-force
security passwords brute-force
edited Feb 21 at 11:03
HackXIt
asked Feb 12 at 22:00
HackXItHackXIt
134
134
If this is Windows, and encryption (EFS) isn’t being used there are easier ways, then a brute force attacking the profile.
– Ramhound
Feb 13 at 2:47
Yes it's windows and it's about BitLocker, so I think it's encrypted (that's the point I suppose).. What other ways are you referring to?
– HackXIt
Feb 19 at 22:03
Your question makes absolutely no mention of BitLocker or EFS being used
– Ramhound
Feb 19 at 22:29
I've edited it accordingly
– HackXIt
Feb 21 at 11:03
add a comment |
If this is Windows, and encryption (EFS) isn’t being used there are easier ways, then a brute force attacking the profile.
– Ramhound
Feb 13 at 2:47
Yes it's windows and it's about BitLocker, so I think it's encrypted (that's the point I suppose).. What other ways are you referring to?
– HackXIt
Feb 19 at 22:03
Your question makes absolutely no mention of BitLocker or EFS being used
– Ramhound
Feb 19 at 22:29
I've edited it accordingly
– HackXIt
Feb 21 at 11:03
If this is Windows, and encryption (EFS) isn’t being used there are easier ways, then a brute force attacking the profile.
– Ramhound
Feb 13 at 2:47
If this is Windows, and encryption (EFS) isn’t being used there are easier ways, then a brute force attacking the profile.
– Ramhound
Feb 13 at 2:47
Yes it's windows and it's about BitLocker, so I think it's encrypted (that's the point I suppose).. What other ways are you referring to?
– HackXIt
Feb 19 at 22:03
Yes it's windows and it's about BitLocker, so I think it's encrypted (that's the point I suppose).. What other ways are you referring to?
– HackXIt
Feb 19 at 22:03
Your question makes absolutely no mention of BitLocker or EFS being used
– Ramhound
Feb 19 at 22:29
Your question makes absolutely no mention of BitLocker or EFS being used
– Ramhound
Feb 19 at 22:29
I've edited it accordingly
– HackXIt
Feb 21 at 11:03
I've edited it accordingly
– HackXIt
Feb 21 at 11:03
add a comment |
1 Answer
1
active
oldest
votes
I've done something similar after mis-typing a password. I used exrex to generate a list from the possible substitutions, by a regex.
You might run something like this to generate all possible variants of a dictionary word. For example, you may wish to run it with the regex [Pp][aA@][sS$ß]{2}[wW][0oO][rR][dD]
To generalise, you might want to script this to do such replacements for all of /usr/dict or some other dictionary files, doing a replacement for each letter of [lowerUPPER], with additional specific cases (like o) having 0
added.
Outputting this to a file will give you a specific list of passwords to try.
I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.
– HackXIt
Feb 19 at 22:05
That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.
– HackXIt
Mar 5 at 12:39
Glad to have helped
– BlueDrink9
Mar 6 at 7:22
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "3"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1405027%2fcreating-a-brute-force-profile-based-on-past-passwords%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
I've done something similar after mis-typing a password. I used exrex to generate a list from the possible substitutions, by a regex.
You might run something like this to generate all possible variants of a dictionary word. For example, you may wish to run it with the regex [Pp][aA@][sS$ß]{2}[wW][0oO][rR][dD]
To generalise, you might want to script this to do such replacements for all of /usr/dict or some other dictionary files, doing a replacement for each letter of [lowerUPPER], with additional specific cases (like o) having 0
added.
Outputting this to a file will give you a specific list of passwords to try.
I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.
– HackXIt
Feb 19 at 22:05
That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.
– HackXIt
Mar 5 at 12:39
Glad to have helped
– BlueDrink9
Mar 6 at 7:22
add a comment |
I've done something similar after mis-typing a password. I used exrex to generate a list from the possible substitutions, by a regex.
You might run something like this to generate all possible variants of a dictionary word. For example, you may wish to run it with the regex [Pp][aA@][sS$ß]{2}[wW][0oO][rR][dD]
To generalise, you might want to script this to do such replacements for all of /usr/dict or some other dictionary files, doing a replacement for each letter of [lowerUPPER], with additional specific cases (like o) having 0
added.
Outputting this to a file will give you a specific list of passwords to try.
I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.
– HackXIt
Feb 19 at 22:05
That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.
– HackXIt
Mar 5 at 12:39
Glad to have helped
– BlueDrink9
Mar 6 at 7:22
add a comment |
I've done something similar after mis-typing a password. I used exrex to generate a list from the possible substitutions, by a regex.
You might run something like this to generate all possible variants of a dictionary word. For example, you may wish to run it with the regex [Pp][aA@][sS$ß]{2}[wW][0oO][rR][dD]
To generalise, you might want to script this to do such replacements for all of /usr/dict or some other dictionary files, doing a replacement for each letter of [lowerUPPER], with additional specific cases (like o) having 0
added.
Outputting this to a file will give you a specific list of passwords to try.
I've done something similar after mis-typing a password. I used exrex to generate a list from the possible substitutions, by a regex.
You might run something like this to generate all possible variants of a dictionary word. For example, you may wish to run it with the regex [Pp][aA@][sS$ß]{2}[wW][0oO][rR][dD]
To generalise, you might want to script this to do such replacements for all of /usr/dict or some other dictionary files, doing a replacement for each letter of [lowerUPPER], with additional specific cases (like o) having 0
added.
Outputting this to a file will give you a specific list of passwords to try.
answered Feb 13 at 2:42
BlueDrink9BlueDrink9
336111
336111
I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.
– HackXIt
Feb 19 at 22:05
That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.
– HackXIt
Mar 5 at 12:39
Glad to have helped
– BlueDrink9
Mar 6 at 7:22
add a comment |
I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.
– HackXIt
Feb 19 at 22:05
That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.
– HackXIt
Mar 5 at 12:39
Glad to have helped
– BlueDrink9
Mar 6 at 7:22
I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.
– HackXIt
Feb 19 at 22:05
I'll give this a try, thanks for your input :) Will take a bit as I don't have much off time to use for this little nuisance.
– HackXIt
Feb 19 at 22:05
That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.
– HackXIt
Mar 5 at 12:39
That regex tip was very sufficient for the task. :) Took me a bit to look into but in the end I managed to get it done right.
– HackXIt
Mar 5 at 12:39
Glad to have helped
– BlueDrink9
Mar 6 at 7:22
Glad to have helped
– BlueDrink9
Mar 6 at 7:22
add a comment |
Thanks for contributing an answer to Super User!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1405027%2fcreating-a-brute-force-profile-based-on-past-passwords%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
If this is Windows, and encryption (EFS) isn’t being used there are easier ways, then a brute force attacking the profile.
– Ramhound
Feb 13 at 2:47
Yes it's windows and it's about BitLocker, so I think it's encrypted (that's the point I suppose).. What other ways are you referring to?
– HackXIt
Feb 19 at 22:03
Your question makes absolutely no mention of BitLocker or EFS being used
– Ramhound
Feb 19 at 22:29
I've edited it accordingly
– HackXIt
Feb 21 at 11:03