
I have multiple lists already generated and I decide which list to use based on the situation. If the hash is MD5, the process will move along much faster and we might want to start with a larger list. This is a situation where we might use the top 100, top 1000, or even top 10000 before we resort to the entire list. If we're using the entire RockYou list for cracking a sha512crypt hash using a basic Graphics Processing Unit (GPU), we could be waiting for a very long time. The RockYou list is in order of most used passwords and if we use head to extract the first 10, first 100, first 1000, or first 10000, we are literally getting the most popular in order.ĭepending upon the specific situation, the speed at which we process through our list will vary greatly. To use this file in its whole form is a last resort but we can easily create smaller lists using the head command. As I mentioned previously, it contains over 14 million passwords. The total size of this file is 134MB - of text. When the file is finished extracting, we should end up with: rockyou.txt On a brand new installation of Kali Linux, you can find the RockYou password list under: /usr/share/wordlists/ In total, there were 32 million passwords in the RockYou breach but in the Kali version of this list, there are only 14 million passwords. The top five most used passwords in RockYou are: The biggest revelation to come from this breach was the frequency of the most basic passwords.

The most notable password list, RockYou, is from a breach that occurred in 2009.

The stock Kali Linux distribution contains a number of password and word lists.
