Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.
torhash.net is just a torrent search engine, no torrents are hosted here.
Word List #1
Infohash:
7B72239853C45180985C19BD00A2C695FCF2A527
Type:
Applications
Title:
WPA Dictionary
Category:
Applications/Other OS
Uploaded:
2010-11-24 (by SkinnyBay)
Description:
Here is a list of words used for cracking WPA encrypted networks, Very useful in Backtrack.
10 million words
upper // lower case nums 1-9 and special chars... 8digits long
Tags:
Files count:
1
Size:
71.61 Mb
Trackers:
udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
Comments:
Wi-Foo-er (2011-01-01)
http://thepiratebay.se/torrent/5945498/WPA-PSK_WORDLIST_3_Final_%2813_GB%29.rar
Wi-Foo-er (2011-01-01)
My wordlist is best, so fuck the resthttp://thepiratebay.se/torrent/5945498/WPA-PSK_WORDLIST_3_Final_%2813_GB%29.rar
DistendedCapacitor (2012-10-15)
@ Wi-Foo-erYou are seriously fucking annoying. You're like a little kid with a new toy that you dont think everybody is paying enough attention to. Your wordlists are solid, but they do have their limitations and fill only a specific need.
As I audit administered networks, I go through a process of elimination with various wordlists. I would utilize a list such as this, after a 6 digit similar one, and from there progress upwards with my lists. When a list fails, I move on to the next one. This allows me to see a few very important things.
For example, if I get positive ID using a 6 digit word list? That network is obviously not very secure, as that password could be broken very easily and in a short amount of time. Potentially even cracked with a basic bruteforce attempt.
This word list is geared towards literal passphrases, rather than mashed codes. It takes but a fragment of time to run this through a database, and requires little to no modification before hand, as i know what is in it from the clear label.
From the description you provided of your wordlists, I would put money on 10% of your list being close to worthless. A pre-config'd list with USER NAMES is not something a professional would use as anything but a last ditch effort to make a positive ID against a PASSWORD.
If you had formatted the lists you included to WPA parameters *individually*, it would be far more useful. (Not to mention far more respectful to the actual creators - not just saying thanks, rolling them into a ball, then stamping your name all over it.)
Just figured I would explain how big of an idiot you make yourself look like to the true white-hats that come around every so often. Basically, call you an idiot - then explain why that's true. Have a good day, and stop eating the glue during craft time.
#############################
@SkinnyBay
at time of post i have not utilized your list, but i appreciate the Ul regardless. If it has any issues... well, thats what linux is for.
:)