Password List

Random things go here

Password List

Post by -Ninjex- on Tue Jan 01, 2013 2:10 pm
([msg=71937]see Password List[/msg])

Hello, guys/girls!

I know this isn't much, but I collected a password list of 17,140 passwords.
I also know there is a lot of password lists with tons more, but adding 17k passwords to that file is always nice, so for the list, go:

HERE

It is on a anonymous paste site!

Enjoy,
Ninjex
Spreading knowledge just once a day, can help keep the script kiddies away ⠠⠵
no_hope if world.map{|person, ic = 0| ic +=1 if ignorance.include?(person)}.compact.length > (world.length / 2)
The absence of evidence is not evidence of absence.
User avatar
-Ninjex-
Addict
Addict
 
Posts: 1064
Joined: Sun Sep 02, 2012 8:02 pm
Blog: View Blog (0)


Re: Password List

Post by limdis on Tue Jan 01, 2013 5:17 pm
([msg=71943]see Re: Password List[/msg])

+1
"The quieter you become, the more you are able to hear..."
"Drink all the booze, hack all the things."
User avatar
limdis
Moderator
Moderator
 
Posts: 1166
Joined: Mon Jun 28, 2010 5:45 pm
Blog: View Blog (0)


Re: Password List

Post by WallShadow on Wed Jan 02, 2013 11:46 am
([msg=71951]see Re: Password List[/msg])

thanks!
User avatar
WallShadow
Contributor
Contributor
 
Posts: 594
Joined: Tue Mar 06, 2012 9:37 pm
Blog: View Blog (0)


Re: Password List

Post by tgoe on Wed Jan 02, 2013 10:18 pm
([msg=71975]see Re: Password List[/msg])

A password list is only as interesting as the post-mortem it came from. :roll:
User avatar
tgoe
Contributor
Contributor
 
Posts: 621
Joined: Sun Sep 28, 2008 2:33 pm
Location: q3dm7
Blog: View Blog (0)


Re: Password List

Post by -Ninjex- on Thu Jan 03, 2013 1:03 am
([msg=71989]see Re: Password List[/msg])

tgoe wrote:A password list is only as interesting as the post-mortem it came from. :roll:

Haha :ugeek:

Tgoe, does this ring any bells: FreeBSD Project?

Just wondering...
Spreading knowledge just once a day, can help keep the script kiddies away ⠠⠵
no_hope if world.map{|person, ic = 0| ic +=1 if ignorance.include?(person)}.compact.length > (world.length / 2)
The absence of evidence is not evidence of absence.
User avatar
-Ninjex-
Addict
Addict
 
Posts: 1064
Joined: Sun Sep 02, 2012 8:02 pm
Blog: View Blog (0)


Re: Password List

Post by tgoe on Thu Jan 03, 2013 3:24 pm
([msg=72006]see Re: Password List[/msg])

ok...




So what does this password list have to do with the FreeBSD project?
User avatar
tgoe
Contributor
Contributor
 
Posts: 621
Joined: Sun Sep 28, 2008 2:33 pm
Location: q3dm7
Blog: View Blog (0)


Re: Password List

Post by -Ninjex- on Thu Jan 03, 2013 4:35 pm
([msg=72007]see Re: Password List[/msg])

tgoe wrote:ok...




So what does this password list have to do with the FreeBSD project?


Nothing, I thought

This may have been you. cause of the avatar.
Spreading knowledge just once a day, can help keep the script kiddies away ⠠⠵
no_hope if world.map{|person, ic = 0| ic +=1 if ignorance.include?(person)}.compact.length > (world.length / 2)
The absence of evidence is not evidence of absence.
User avatar
-Ninjex-
Addict
Addict
 
Posts: 1064
Joined: Sun Sep 02, 2012 8:02 pm
Blog: View Blog (0)


Re: Password List

Post by tgoe on Fri Jan 04, 2013 5:31 am
([msg=72021]see Re: Password List[/msg])

I meant what I said earlier. A password list without context isn't much better than a random char dump. i.e., no "meta".

LOL
User avatar
tgoe
Contributor
Contributor
 
Posts: 621
Joined: Sun Sep 28, 2008 2:33 pm
Location: q3dm7
Blog: View Blog (0)


Re: Password List

Post by KthProg on Sun Jan 27, 2013 7:05 pm
([msg=72739]see Re: Password List[/msg])

I dont understand is this supposed to be a sloghtly better but less reliable alternative to brute forcing or something?
User avatar
KthProg
Poster
Poster
 
Posts: 219
Joined: Wed Jan 23, 2013 7:06 pm
Blog: View Blog (0)


Re: Password List

Post by WallShadow on Sun Jan 27, 2013 8:08 pm
([msg=72742]see Re: Password List[/msg])

KthProg wrote:I dont understand is this supposed to be a sloghtly better but less reliable alternative to brute forcing or something?


This is for a form of brute forcing attack called a dictionary attack. You use a password list (your dictionary) instead of consecutive strings to guess the passwords. Good for when you can attack hundreds of accounts at once, a good password list will crack a fair percentage of the accounts (anywhere from 25% to 70%).
User avatar
WallShadow
Contributor
Contributor
 
Posts: 594
Joined: Tue Mar 06, 2012 9:37 pm
Blog: View Blog (0)


Next

Return to Off-Topic

Who is online

Users browsing this forum: No registered users and 0 guests