The end of 3-word passphrase cracking just occurred for nsec3, wow.
157136 words cracked so far (counting results from all the cracks).

passphrase7 is super effective!
python3 ../crack/passphrase7.py ../crack/ai3words_order_lower_digits_8k.txt ../crack/ai3words_order_lower_digits.txt | ~/src/john-1.7.9-jumbo-5/run/john --config=/home/jvoss/.john/john.conf --stdin --format=nsec3-sha1 --external=DNS hashes1su.txt 

themischievouscom (?)

so the words from the first file go on the end, the words from the second file 
go at the start, I will fix that.

usaauthentique is the last passphrase7.py 

the reverse is working so well. It's amazing. Amazing. So fast.
3:27+1:35
164970-164302

133 cracks per minute in the first 3.5 minutes wall clock time (5 minutes cpu time).

230 cracks per minute in the first 6 minutes (8.75 minutes cpu time).

Clearly it's the best way to find passphrases:
Long one first, short one second. I'm not sure why.
python3 ../crack/passphrase7.py ../crack/ai3words_order_lower_digits.txt ../crack/ai3words_order_lower_digits_8k.txt | ~/src/john-1.7.9-jumbo-5/run/john --config=/home/jvoss/.john/john.conf --stdin --format=nsec3-sha1 --external=DNS hashes1su.txt 

python3 passphrase7.py ../ai3words_order_lower_digits.txt ../ai3words_order_lower_digits_8k.txt |less
0 0
thethe
theof
theand
thein
theto
thea
thewas
theis
thefor
theas
theby
thewith
theon
thethat
thefrom
theat
thehis
thean
thewere
theare
theor
theit
thehe
thewhich
thebe
thehad
thealso
thehas
thenot
thetheir
...

At 8000, it restarts with ofthe
That means every 8000 cracks, it switches the first which makes perfect sense why its 
the best system. To extend, we need only need the second 8000.
Let's do that now. Done, it's in ../ai3words_order_lower_digits_8k2.txt
head -n 16000 ../ai3words_order_lower_digits.txt |tail -n 8000 > ../ai3words_order_lower_digits_8k2.txt

After 22 minutes of wall clock time, we're still at 149 cracks per minute. This is amazing.

We're at 107175 words x 8000 now.
857M passphrases tested, approximately 5000 matches. That's astounding.

I should draw the position of each word in john.pot in each passphrase list.

We've gotten to the magical point of 43% of domain names cracked. How many weeks ago were we at 30 some percent? Let's look for that data.

Nov  6, we had 110311 lines in john4.pot. 28% cracked back 6 weeks ago. That means we've done 15% in 6 weeks.

So the design of passphrase8 should be the reverse so that we can have fast start with the opposite word order.


I've now done so many different things that I'm kinda done with it, but I keep finding new ways to get a few hundred more. Every one should be figured out.

This one got a bunch in seconds:

gawk '{print $2}' john9.txt |grep -o '^[^.]*'>john9.wl

python3 -O ../crack/passphrase/passphrase7.py john9.wl <(head -n 100 ../crack/ai3words_order_lower_digits_8k.txt)  |~/src/john-1.7.9-jumbo-5/run/john --config=/home/jvoss/.john/john.conf --session=pp7 --stdin --format=nsec3-sha1 --external=DNS hashes4comu.txt

# The next 500 words:
python3 -O ../crack/passphrase/passphrase7.py john9.wl <(head -n 600 ../crack/ai3words_order_lower_digits_8k.txt |tail -n 500)  |~/src/john-1.7.9-jumbo-5/run/john --config=/home/jvoss/.john/john.conf --session=pp7 --stdin --format=nsec3-sha1 --external=DNS hashes4comu.txt

At this point we're getting rediculously long and complex words.

____ofnorway is popular.

passphrase8.py doesn't work the same way.

names of cities, states, countries?

This works very very well (wordxyz):
python3 -O ../crack/passphrase/passphrase3.py john9.wl  |~/src/john-1.7.9-jumbo-5/run/john --config=/home/jvoss/.john/john.conf --session=pp7 --stdin --format=nsec3-sha1 --external=DNS hashes4comu.txt          

As does the reverse (xyzword):
python3 -O ../crack/passphrase/passphrase2.py john9.wl  |~/src/john-1.7.9-jumbo-5/run/john --config=/home/jvoss/.john/john.conf --session=pp7 --stdin --format=nsec3-sha1 --external=DNS hashes4comu.txt          

This works:
python3 -O ../crack/passphrase/passphrase8.py maxhit1a.wl ~/src/nsec3breaker/testdata/wordlist-domains-wheat_mod.txt  |~/src/john-1.7.9-jumbo-5/run/john --config=/home/jvoss/.john/john.conf --session=pp7a --stdin --format=nsec3-sha1 --external=DNS hashes4comu.txt

maxhit1a.wl is an interesting system. See it's source.

python3 ../crack/passphrase7.py ../crack/ai3words_order_alnum_lower.txt ../crack/ai3words_order_lower_digits_8k.txt | ~/src/john-1.7.9-jumbo-5/run/john --config=/home/jvoss/.john/john.conf --stdin --format=nsec3-sha1-salt --external=DNSxyz --session=xyz1 hashes5xyzsu.txt

bellevuewa.gov:
python3 -O ../crack/passphrase/passphrase8.py ../crack/ai3words_order_alnum_lower.txt state_abbrev.txt  |~/src/john-1.7.9-jumbo-5/run/john --config=/home/jvoss/.john/john.conf --session=pp7 --stdin --format=nsec3-sha1-salt --external=DNSgov hashes5gov2su.txt
tukwila-wa.gov:
python3 -O ../crack/passphrase/passphrase8.py ../crack/ai3words_order_alnum_lower.txt state_abbrev2.txt |~/src/john-1.7.9-jumbo-5/run/john --config=/home/jvoss/.john/john.conf --session=pp7 --stdin --format=nsec3-sha1-salt --external=DNSgov hashes5gov2su.txt

