πŸ” Password Mutations & Wordlist Generation

🧠 Human Weakness in Password Creation

Despite system-enforced password policies, users tend to choose simple and predictable passwords. This is due to:

  • Preference for convenience over security.

  • Predictable patterns (e.g., names, pets, company name, hobbies).

  • OSINT (Open-Source Intelligence) can help attackers guess passwords by learning user preferences.

➑️ Learn more in the OSINT: Corporate Reconarrow-up-right module.


πŸ”’ Common Password Policies

Most systems enforce rules like:

βœ… Description
πŸ” Password Syntax

First letter is uppercase

Password

Adding numbers

Password123

Adding a year

Password2022

Adding a month

Password02

Ending with an exclamation mark

Password2022!

Using special characters

P@ssw0rd2022!

πŸ“ Most passwords are ≀10 characters (per WP Engine stats).


πŸ”§ Strategy for Weak Password Generation

  1. Start with familiar terms (β‰₯5 characters):

    • Pet names

    • Hobbies

    • Favorite teams

    • Months, seasons, etc.

  2. Add mutations to meet complexity:

    • Year

    • Special character

    • Capitalization

πŸ“Œ Example (from a list with just one entry password):


Using Hashcat for Mutations

Hashcat allows custom rule-based password generation.

πŸ”§ Basic Syntax for Rules

Function
Description

:

Do nothing

l

Lowercase all letters

u

Uppercase all letters

c

Capitalize first letter

sXY

Replace character X with Y

$!

Add exclamation mark at the end

πŸ“ Custom Rule File (custom.rule)

πŸ” Each word from password.list gets mutated 15 times.

Generate the mutated list

πŸ“„ Sample Output (mut_password.list)


Pre-built Hashcat Rule Files

Hashcat comes with a number of pre-defined rules:

πŸ“ Location: /usr/share/hashcat/rules/

πŸ“Œ Popular Rules Include:

  • best64.rule βœ…

  • rockyou-30000.rule

  • dive.rule

  • InsidePro-HashManager.rule

  • unix-ninja-leetspeak.rule

  • ...and many more


Wordlist Generation with CeWL

CeWL scrapes words from websites to generate custom wordlists.

πŸ“˜ Example:

πŸ”’ Count entries:

πŸ“Œ Combine this with Hashcat rules for targeted and effective password guessing.


🧩 Summary

βœ… Use common patterns and user interests. βœ… Leverage Hashcat mutation rules and CeWL for web-based term extraction. βœ… Build targeted, compact wordlists to improve password cracking efficiency.

πŸ”— Learn more in Cracking Passwords with Hashcatarrow-up-right

Last updated