Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Not producing results #14

Open
Aadi1659 opened this issue Nov 5, 2024 · 0 comments
Open

Not producing results #14

Aadi1659 opened this issue Nov 5, 2024 · 0 comments

Comments

@Aadi1659
Copy link

Aadi1659 commented Nov 5, 2024

Hey ! So I was trying out OMEN and wanted to see how it performs but I dont really know what I am actually doing wrong as OMEN is not producing results.

I trained OMEN on Rockyou dataset and tested on 2.6 million passwords as mentioned in the paper. I was expecting around 68% success rate for 1 B guesses on the test dataset. Screenshot from the paper
image

When I tried I got only 28 % success rate. I have tried this several times and also with MySpace dataset but again very poor results.
I even created the alphabet file as mentioned in one the Issues.
Am I doing something wrong? If anyone can help me, it will be really helpful! Thanks

I am leaving my enumNG log text down below:
=== log file for enumNG ===
-> run through successful

Start: Tue Nov 5 07:22:01 2024
End: Tue Nov 5 07:36:01 2024
Elapsed time: 0 hour(s), 14 minute(s) and 0 second(s)

== Settings ==

  • lengthProbs
  • lengthLevelFactor (0.000)
  • maxAttempts: 1000000000
  • simulatedAttack (target: random_passwords.txt)
  • VerboseFileMode
  • SizeOf_N: 4
  • maxLevel: 11
  • Filenames:
    initial probabilities: 'IP'
    conditional probabilities: 'CP'
    end probabilities: 'EP'
    lengths: 'LN'
    config: 'createConfig'
    input: 'rockyou.txt'
  • Alphabet: 'ae10i2onrls938t45m67cdyhubkgpjvfwzAxEILORNSM.TCD_BqHYK!U-PG*J@FVWZ/#$X,+&=)?Q(';"<]%~:[^`>{}'
  • sizeOf_Alphabet: 95
  • Selected smoothing: additive
    - delta:
    - IP: 1; CP: 1; EP: 1; LN: 0;
    - levelAdjustFactor:
    - IP: 250; CP: 2; EP: 250; LN: 1;

== Sorted arrays ==
lastGram (level - count):
0 - 20402
1 - 135567
2 - 489004
3 - 73714376
4 - 5356182
5 - 1027452
6 - 402087
7 - 181112
8 - 97379
9 - 25186
10 - 1878

initial Prob (level - count):
0 - 42
1 - 243
2 - 727
3 - 1623
4 - 2003
5 - 4477
6 - 9056
7 - 14056
8 - 21305
9 - 50498
10 - 753345

end Prob (level - count):
0 - 17
1 - 149
2 - 1238
3 - 1326
4 - 2431
5 - 4628
6 - 8679
7 - 15410
8 - 22121
9 - 47482
10 - 753894

length (length - level):
6 - 1
7 - 1
8 - 1
9 - 1
10 - 1
11 - 2
12 - 3
13 - 3
5 - 4
14 - 4
15 - 4
16 - 4
17 - 5
4 - 6
18 - 6
19 - 6

== Simulated attack mode ==
TestingSet file: 'random_passwords.txt'
created: 1000000000 of 1000000000
cracked: 744082 of 2600000(28.62 %)

lengths of the created passwords (length - created - cracked)
3 - 0 - 0
4 - 1901 - 235
5 - 47020 - 5595
6 - 4140330 - 153954
7 - 23888234 - 192507
8 - 124956986 - 180225
9 - 390371187 - 111558
10 - 349397018 - 90201
11 - 68046432 - 7318
12 - 13755065 - 1583
13 - 17063309 - 647
14 - 2598141 - 141
15 - 2723010 - 87
16 - 2747154 - 25
17 - 237434 - 3
18 - 14470 - 1
19 - 12309 - 2
20 - 0 - 0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant