Disclaimer: I do not accept responsibility for any issues arising from scripts being run without adequate understanding. It is the user's responsibility to review and assess any code before execution. More information

Smart Wordlists: Password Dictionary "targeted" to individuals.

If you need to generator a password list, I have already been though the public RockYou2021 and RockYou2024 versions that are very large file, you can see the size difference between RockYou2021 and RockYou2024 below:


If you do not want to use these lists and you want to create your own then you have a couple of options fist we have CUPP which is a basic password list generator that will ask you about the "targets" details as you can see below:


This will go into details about the user and as you can see partners names/nicknames, child names/nicknames, pets names and company name then you can add custom words and special characters at the end of those words:


This will then generate a list of passwords which taking out last keyword of "zero trust" will then generate a list like this:


While this looks good, really you more than one word combining and if you have a 20 character password then all these attempts will be invalid as they are all shorter than the password policy, this means while the theory works the passwords will not be "cracked" as they are to short.

This is where "next generator password generators" like this come into play : https://github.com/r3nt0n/bopscrk this is a tool that will allow you to generate smart and powerful wordlists for targeted attacks that can be used outside targeted attacks, first we need to get it installed with this:

git clone --recurse-submodules https://github.com/r3nt0n/bopscrk
cd bopscrk
pip install -r requirements.txt
chmod +x bobscrk.py
bopscrk -i

This will then run this tool that for a moment looks like the Doom loading page:


Now we need to fill all the details about password length and keywords and names as before, that is below:


This will then get to work on the wordlist to be used with hashcat, here you can see this being generated:


When complete this will give you the details about the password list generated:


Hashcat and the "custom" password list.

We now need to run Hashcat with that custom dictionary list which in this example is completed with this command:

hashcat -m 1000 JustTheHashes.txt output.txt -r OneRuleToRuleThemAll.rule --force --optimized-kernel-enable -w 3 -d 1

When this is run via Hashcat you will notice, that while we are only looking at one password, the password was cracked with this wordlist in under 4 seconds - the password here (blurred out at the top was 3 words with numbers/special characters between the words - targeting dictionary's to specific individuals can be beneficial.


Insight into "password words" that could be used

If you have the example of "blue" + "winter" + "123", this tool would understand:

  • Someone who loves winter might use "BlueFrost2024" or "WinterBlue!"
  • A skier might combine "BlueSlopes" with the year they started skiing
  • Someone born in winter might use "BlueDecember" + their birth year
Previous Post Next Post

نموذج الاتصال