Generate Wordlists
Last updated
Was this helpful?
Last updated
Was this helpful?
Having a good wordlist is critical to carrying out a successful password attack. It is important to know how you can generate username lists and password lists. In this section, we will discuss creating targeted username and password lists.
Tools such as can be used to effectively crawl a website and extract strings or keywords. Cewl is a powerful tool to generate a wordlist specific to a given company or target.
CeWL is a ruby app which spiders a given URL, up to a specified depth, and returns a list of words which can then be used for password crackers such as John the Ripper. Optionally, CeWL can follow external links.
Rule-Based attacks assume the attacker knows something about the password policy. Rules are applied to create passwords within the guidelines of the given password policy and should, in theory, only generate valid passwords. Using pre-existing wordlists may be useful when generating passwords that fit a policy — for example, manipulating or 'mangling' a password such as password
: p@ssword
, Pa$$word
, Passw0rd
, and so on.
rule sets are located at /usr/share/hashcat/rules/
. You can generate a wordlist using a rule as follow:
You can also use the rule to generate a wordlist.
To create your own rules, you definitely want to check this , but here is an example of creating your custom rule and some notes about useful functions:
Append Char
$X
$1$2
Password
Password12
Prepend Char
^X
$1$2
Password
12Password
Capitalize the first letter and lower the rest
c
c
password
Password
Uppercase all letters
u
u
password
PASSWORD
Note that if the rule functions are:
On the same line, separated by a space: Hashcat will use them consecutively on each password of the word list.
On separate lines: Hashcat will use each rule separately on each password of the word list.
Let's assume an AD password policy that requires an upper case letter, a special character, and a numerical value. We may use the following rules along with hashcat:
is an other greate tool from . It generates a wordlist from the information present in , in order to crack passwords of domain accounts.
has a config file that contains rule sets, which is located at /etc/john/john.conf
or /opt/john/john.conf
depending on your distro or how john was installed. You can read /etc/john/john.conf and look for List.Rules
to see all the available rules:
is a Python password list generator tool that can generates millions of keyword-based password mutations in seconds.