Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/kaonashi-passwords/Kaonashi

Wordlist, rules and masks from Kaonashi project (RootedCON 2019)
https://github.com/kaonashi-passwords/Kaonashi

dictionary dictionary-attack hashcat kaonashi kaonashi14m kaonashiwpa masks password password-cracking password-leak password-safety password-strength rootedcon rules wordlist wpa

Last synced: about 1 month ago
JSON representation

Wordlist, rules and masks from Kaonashi project (RootedCON 2019)

Awesome Lists containing this project

README

        



## Kaonashi Project: RootedCON 2019
![helo](https://img.shields.io/badge/current%20version-20190803-blue.svg)

This repository contains several directories:

* Sorted ***Masks*** for hashcat
* Advanced ***Rules*** for hashcat
* Links to download the Kaonishi's ***Wordlists***
* ***Slides*** used in our talk [I know your p4$$w0rd (and if I don't, I will guess it...)](https://www.slideshare.net/segofensiva/i-know-your-p4w0rd-and-if-i-dont-i-will-guess-it-139829304) at [RootedCON (2019)](https://rootedcon.com/)

__*A clone may not be necessary to get the files you need*.__


## Why
When a user has to choose a password, he tends to build it in the same way, using the same personal information, and using the same complexity ideas.

In this study we processed several billions of real passwords in order to make a large-scale analysis of these common behaviors, drawing conclusions that allow us to create specific procedures and tools to improve current Password Cracking techniques.

## How
We used different methods, like behavioral and statistical analysis, neural networks and other advanced techniques, to obtain patterns and relevant information that allow us to crack hashes whose resistance is usually quite high.

## Kaonashi Wordlist
These wordlists have been extracted from real password leaks, and sorted by number of ocurrences. By having the wordlists sorted this way, users can extract TOP _n_ lines/passwords and create custom wordlists based on their needs.

You can use the following Mega links to download compressed (7z) wordlists:

* [Kaonashi](https://mega.nz/#!nWJXzYzS!P1G8HDiMxq5wFaxeWGWx334Wp9wByj5kMEGLZkVX694) (2.35 GB)
* [Kaonashi14M](https://mega.nz/#!7fIlxQaC!BlrWduRgBwWH_Za9SoEJnnq7ySrV4E_NzfTtn_OI418) (47.7 MB)
* [KaonashiWPA100M](https://mega.nz/#!jeRRgQgZ!xcRcLpm0ftuu7z7JN32LHMECqk9vmpVNH2JFVxSICfU) (323.9 MB)

You can also find .torrent files inside wordlists/ directory


## Authors and Attributions
* [Jaime Sánchez](https://www.seguridadofensiva.com) [@segofensiva)](https://twitter.com/segofensiva)
* [Pablo Caro](https://pcaro.es) [(@pcaro90)](https://twitter.com/pcaro90)
* Thanks to everyone in the password cracking scene for inspiration and lists

## Disclaimer and License
+ These code and wordlists are for LAWFUL, ETHICAL AND EDUCATIONAL PURPOSES ONLY.
+ The files contained in this repository are released "as is" without warranty, support, or guarantee of effectiveness.
+ We are open to hearing about any issues found within these files and will be actively maintaining this repository for the foreseeable future. If you find anything noteworthy, let us know and we'll see what we can do about it.

The authors did not steal, phish, deceive or hack in any way to get hold of these passwords.
All lines in these files were obtained through freely available means.

The intent for this project is to provide information on insecure passwords in order to increase overall password security. The lists will show you what passwords are the most common, what patterns are the most common, and what you should avoid when creating your own passwords.

[![License: GPL v3](https://img.shields.io/badge/License-GPLv3-blue.svg)](https://www.gnu.org/licenses/gpl-3.0)

__This work is licensed under a [GNU General Public License v3 License.](https://www.gnu.org/licenses/gpl-3.0.en.html)__


### Happy Password Cracking!