Exploring the Best Lists in the Openwall Wordlists Collection
Openwall’s wordlists collection is a widely used set of password wordlists curated for password auditing, penetration testing, and research. Below is a concise guide to the most useful lists in the collection, what they’re best for, and practical tips for using them.
1. rockyou-*.txt (and compressed variants)
- What: Large, general-purpose wordlists derived from real-world leaked passwords.
- Best for: Broad coverage when performing offline cracking against common passwords.
- Tip: Use as a baseline; run with rule-based mutation (e.g., Hashcat rules) for higher success.
2. passphrases and phrases lists
- What: Longer entries and common multi-word combinations.
- Best for: Cracking passphrases and phrases-based passwords (longer, more natural-language).
- Tip: Combine with mangling rules that preserve word boundaries.
3. mangled / transformed lists
- What: Lists produced by applying common transformations (capitalization, leet substitutions, appending numbers/symbols).
- Best for: Targets that slightly modify common words (e.g., “Password1”, “P@ssw0rd!”).
- Tip: Use in a prioritized sequence after base lists to catch common variants quickly.
4. username-derived and name lists
- What: Collections of given names, surnames, usernames, and common personal identifiers.
- Best for: Targeted attacks where personal-info-based passwords are likely (social-engineering cases).
- Tip: Pre-filter by target locale/language to reduce noise and improve hit rate.
5. domain- and service-specific lists
- What: Wordlists tailored to specific services, software, or industries (e.g., IoT defaults, CMS admin passwords).
- Best for: Focused assessments against known-vendor defaults or common admin credentials.
- Tip: Use early in testing against devices or applications with known default/password patterns.
Practical workflow suggestions
- Start broad: Run large real-world lists (rockyou, common) with fast rules to catch easy passwords.
- Targeted passphrase phase: Use phrase and passphrase lists for longer passwords.
- Apply mangling: Run mangled/transformed lists or rules to catch common variations.
- Personalized phase: Use username/name/location lists when testing specific targets.
- Specialized phase: Finish with domain/service-specific lists for high-value targets.
Tools and integration
- Use Hashcat or John the Ripper for efficient cracking and rule application.
- Use wordlist management tools (e.g., wordlist filters, deduplicators) to optimize size and avoid redundant checks.
Final note
Prioritize legality and consent: only use these wordlists for authorized security testing, research, or defensive assessments.
Leave a Reply