Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.

Word List #1

Infohash:

7B72239853C45180985C19BD00A2C695FCF2A527

Type:

Applications

Title:

WPA Dictionary

Category:

Applications/Other OS

Uploaded:

2010-11-24 (by SkinnyBay)

Description:

Here is a list of words used for cracking WPA encrypted networks, Very useful in Backtrack. 10 million words upper // lower case nums 1-9 and special chars... 8digits long

Tags:

  1. Words
  2. 10 Million
  3. WPA
  4. Cracking
  5. Hacking
  6. Backtrack

Files count:

1

Size:

71.61 Mb

Trackers:

udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969

Comments:

Wi-Foo-er (2011-01-01)

http://thepiratebay.se/torrent/5945498/WPA-PSK_WORDLIST_3_Final_%2813_GB%29.rar


Wi-Foo-er (2011-01-01)

My wordlist is best, so fuck the rest
http://thepiratebay.se/torrent/5945498/WPA-PSK_WORDLIST_3_Final_%2813_GB%29.rar


DistendedCapacitor (2012-10-15)

@ Wi-Foo-er
You are seriously fucking annoying. You're like a little kid with a new toy that you dont think everybody is paying enough attention to. Your wordlists are solid, but they do have their limitations and fill only a specific need.
As I audit administered networks, I go through a process of elimination with various wordlists. I would utilize a list such as this, after a 6 digit similar one, and from there progress upwards with my lists. When a list fails, I move on to the next one. This allows me to see a few very important things.
For example, if I get positive ID using a 6 digit word list? That network is obviously not very secure, as that password could be broken very easily and in a short amount of time. Potentially even cracked with a basic bruteforce attempt.
This word list is geared towards literal passphrases, rather than mashed codes. It takes but a fragment of time to run this through a database, and requires little to no modification before hand, as i know what is in it from the clear label.
From the description you provided of your wordlists, I would put money on 10% of your list being close to worthless. A pre-config'd list with USER NAMES is not something a professional would use as anything but a last ditch effort to make a positive ID against a PASSWORD.
If you had formatted the lists you included to WPA parameters *individually*, it would be far more useful. (Not to mention far more respectful to the actual creators - not just saying thanks, rolling them into a ball, then stamping your name all over it.)
Just figured I would explain how big of an idiot you make yourself look like to the true white-hats that come around every so often. Basically, call you an idiot - then explain why that's true. Have a good day, and stop eating the glue during craft time.
#############################
@SkinnyBay
at time of post i have not utilized your list, but i appreciate the Ul regardless. If it has any issues... well, thats what linux is for.
:)