TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Prince – Modern password guessing algorithm [pdf]

58 pointsby timo_hover 10 years ago

3 comments

PaulHouleover 10 years ago
Looks like a distant relative of the American Fuzzy Lop.<p>I remember the go-go years of the early 1990s, when shadow passwords weren&#x27;t the norm and cracking was easy.<p>Back then I&#x27;d consistently find machines in academic environments had a password same as username or an empty password. In fact, in non-technical areas, this could be the account of the &quot;person in charge&quot;. I&#x27;d see 50% as many with a password involving things seen in the &#x2F;etc&#x2F;passwd line and then maybe 10% as many of that by running a word list I got out of PHRACK.
评论 #8718511 未加载
scott_karanaover 10 years ago
Looks pretty sweet. From TFA:<p><pre><code> PRINCEPROCESSOR V0.10 RELEASE Download from: https:&#x2F;&#x2F;hashcat.net&#x2F;tools&#x2F;princeprocessor&#x2F; - Linux - Windows - OSX</code></pre>
dhfromkoreaover 10 years ago
Interesting. I am new to the world of password guessing. Is there any significant benefit of using this attack vector? Is use of personal data alone able to offer a remarkable advantage?
评论 #8719530 未加载