What is Rockyou wordlist?
rockyou wordlist is a password dictionary used to help to perform different types of password cracking attacks. It is the collection of the most used and potential passwords.
Many Password cracking tools are used dictionary attack method to retrieve the password. If you are using same method to crack the password then you will have to require a password wordlist.
So Offensive Security (Mother of Kali Linux) has added already many dictionaries in Kali Linux by default, RockYou wordlist is one of the biggest dictionaries.
Rockyou wordlist in Kali Linux 2022.2
First, rockyou wordlist was added in the backtrack and later it was added in Kali Linux 1. This is the first version of kali Linux launched in 2013.
I have eyes on Kali Linux from the born of it. by the way, using Kali Linux awesome. You can create your own dictionary during a password cracking attack.
You can use crunch and cwel for creating a wonderful dictionary. But if you are a beginner and just want to test tools or practice the tool, then RockYou wordlist is good for you.
Location of Rockyou wordlist
Trust me or not, you can’t remember rockyou location if I will tell you. Right now I don’t know the location exactly. I can’t remember it. Even I used this dictionary multiple time.
Who cares about its location?
I believe to give you a direction to find out the location by yourself whenever you forget the location.
Here is the command locate which is used to Find a File in Linux in All Directories. or any specific location.
Use the following command to know the location of rockyou wordlist:
[email protected]:~#locate rockyou /usr/share/hashcat/masks/rockyou-1-60.hcmask /usr/share/hashcat/masks/rockyou-2-1800.hcmask /usr/share/hashcat/masks/rockyou-3-3600.hcmask /usr/share/hashcat/masks/rockyou-4-43200.hcmask /usr/share/hashcat/masks/rockyou-5-86400.hcmask /usr/share/hashcat/masks/rockyou-6-864000.hcmask /usr/share/hashcat/masks/rockyou-7-2592000.hcmask /usr/share/hashcat/rules/rockyou-30000.rule /usr/share/john/rules/rockyou-30000.rule /usr/share/wordlists/rockyou.txt.gz [email protected]:~#
See the last line of the result in the above image. the location is /usr/share/wordlists/rockyou.txt.gz
You can confirm the location by using the ls command followed by rockyou wordlist location.
See the Example below
[email protected]:~#ls /usr/share/wordlists/ dirb dnsmap.txt fern-wifi nmap.lst wfuzz dirbuster fasttrack.txt metasploit rockyou.txt.gz [email protected]:~#
Unzip rockyou.txt.gz into rockyou txt
Have you noticed one thing? The rockyou file has .gz extension of the file. This is not a normal file, this is a zip file. Neither you can see the content from this file nor you can use it.
zip file is not useful anymore. So you need to extract / unzip by using following commands
#gzip -d rockyou.txt.gz
I hope you have liked this article, If yes then please thumbs up. If you have questions leave in the comment box. Whenever I will get time, reply to you.
Thanks for Reading full article.
not able to unzip the rockyou file, can u pls help. im online
sudo thunar and unzip with gui ( just drag and drop file from double clic on .gz to desktop)
just follow this commands
/usr You should see [/urs]
share You should see [/usr/share]
wordlists You should see [/usr/share/wordlist
gzip -d rockyou.txt.gz
ls and your rockyou.txt.gz should be unzip
I want to hack a WiFi but I have tried rockyou.txt file after waiting more than 3 hours it says that WiFi pass doese not match
If the password exists in the dictionary, you will get result otherwise failed
How do I use John the ripper now? Can you give an example for that as well. I followed your steps. Thank you it helped but to finish I need to crack my hash which is in a txt file
John the ripper is a good tool for cracking hashes, use hashcat for cracking hashes https://www.cyberpratibha.com/hashcat-tutorial-for-password-cracking/
am i supposed to use rocky.txt with instashell to get an instagram password
Yes you can
It is saying no such file or directory when running:
gzip -d rockyou.txt.gz.
What to do now?
Make sure you location path is correct