Feb 21, 2017 - Learn how to generate wordlists with Crunch on Kali Linux. For those readers that aren't familiar, a brute force password attack is an attack in. Hydra is pre installed in Kali linux, and in Backtrack too. A Bruteforce attack with hydr, tries every combination of password. A Bruteforce attack with hydr, tries every combination of password. You can set your own wordlist to use.
I notice that in
/usr/share/wordlists
in Kali Linux (former Backtrack) there are some lists. Are they used to bruteforce something? Is there specific list for specific kind of attacks?Stephenloky
StephenlokyStephenloky25311 gold badge44 silver badges1616 bronze badges
4 Answers
Kali linux is a distribution designed for penetration testing and computer forensics, both which involve password cracking. So you are right in thinking that word lists are involved in password cracking, however it's not brute force.
Brute force attacks try every combination of characters in order to find a password, while word lists are used in dictionary based attacks. Many people base their password on dictionary words, and word lists are used to supply the material for dictionary attacks. The reason you want to use dictionary attacks is that they are much faster than brute force attacks. If you have many passwords and you only want to crack one or two then this method can yield quick results, especially if the password hashes are from places where strong passwords are not enforced.
Typical tools for password cracking (John the Ripper, ophtcrack, hashcat, etc) can do several types of attacks including:
- Standard brute force: all combinations are tried until something matches. You tpyically use a character set common on the keyboards of the language used to type the passwords, or you can used a reduced set like alphanumneric plus a few symbols. the size of the character set makes a big difference in how long it takes to brute force a password. Password length also makes a big difference. This can take a very long time depending on many factors
- Standard dictionary: straight dictionary words are used. It's mostly used to find really poor passwords, like password, password123, system, welcome, 123456, etc.
- Dictionary attack with rules: in this type dictionary words are used as the basis for cracks, rules are used to modify these, for instance capitalizing the first letter, adding a number to the end, or replacing letters with numbers or symbols
Rules attacks are likely the best bang for the buck if all you have are standard computing resources, although if you have GPUs available brute-force attacks can be made viable as long as the passwords aren't too long. It depends on the password length, hashing/salting used, and how much computing power you have at your disposal.
GdDGdD16.6k22 gold badges3636 silver badges6060 bronze badges
One of the better basic wordlists in Kali is
/usr/share/wordlists/rockyou.txt.gz
. To unzip simply run gzip -d /usr/share/wordlists/rockyou.txt.gz
. Be sure to add 'known weak' passwords that are used by the organization you are testing. I like to add these 'additional' custom passwords to the top so they are tested first.
d3lphid3lphi
Those lists can be used to feed into several programs. So for instance
qbiaircrack-ng
has an option -w
where it takes a wordlist as argument. The password testing program John the Ripper also takes wordlists to accelerate the guessing.qbi
1,38811 gold badge1212 silver badges2626 bronze badges
In addition to what's already mentioned here, the wordlists are used in conjunction with some of the web app tools and things such as sqlmap. If you're looking for places to use them, download some of the 'boot to root' VMs like Kioptrix and De-ICE and have a go at brute-ing some passwords.
As for specific lists for specific types of hacks - not really. Unless you're doing something targeted against a person you know some facts about (in which case you'll use something like CUPP - Common User Passwords Profiler - to generate a custom wordlist for that particular target).
AlexHAlexH
protected by Community♦Nov 6 '17 at 8:30
Thank you for your interest in this question. Because it has attracted low-quality or spam answers that had to be removed, posting an answer now requires 10 reputation on this site (the association bonus does not count).
Would you like to answer one of these unanswered questions instead?
Would you like to answer one of these unanswered questions instead?
Not the answer you're looking for? Browse other questions tagged passwordsbrute-forcekali-linuxdictionary or ask your own question.
Below are some dictionaries that can be used with Backtrack or Kali Linux. They are plain Wordlist dictionaries used to brute force WPA/WPA2 data captures with aircrack-ng.
These are dictionaries that have been floating around for some time now and are here for you to practice with. Once you get good at using a dictionary,and if these don’t crack the password for you, it would be a good idea to make your own with Crunch.
I have also included Wordlist that come pre-installed with Backtrack and Kali called darkc0de.lst and rockyou.txt
Due to bandwidth and storage limitations I am using free file sharing services Mediafire, Openload, and 4shared to store the files for download.
Wireless Pen testing requires an adapter that can go into monitor mode.
WPA/WPA 2 Dictionaries Downloads
If the Wordlist below are removed here is a Torrent link to download a 8.5GB collection of WPA/WPA2 Wordlist Dictionaries. A Torrent client will be needed.
The Big WPA List files will need to be extracted after downloading.
Direct Download Links
BIG-WPA-LIST-1 MediaFire 247MB
BIG-WPA-LIST-1 Openload 247MB
BIG-WPA-LIST-1 4shared
BIG-WPA-LIST-2 MediaFire307MB
BIG-WPA-LIST-2 Openload 307MB
BIG-WPA-LIST-2 4shared
BIG-WPA-LIST-3 Openload 277MB
BIG-WPA-LIST-3 MediaFire
BIG-WPA-LIST-3 4shared
Darkc0de.lst MediaFire 17.4MB Default Backtrack 5 Dictionary
Darkc0de.lst Openload 17.4MB Default Backtrack 5 Dictionary
Rockyou.txt133MB Default Kali Linux Dictionary
Rockyou.txt Openload 133MB Default Kali Linux Dictionary
Names MediaFire 3.7MB Long file list of names and name variations
Names Openload 3.7MB Long file list of names and name variations