Background:
I am currently trying to crack a salted md5 hash which I have recovered from an embedded device running busybox and manufactured in china.
I have tried john the ripper using all of the wordlists I could find in Kali.
I have tried cloudcracker and that returned no results.
I am currently brute-forcing on a machine with several GPUS using oclHashcat but haven't got anything back yet.
I have a serial console on the device which is in English. I have a low privileged account with the username jdoe and no password. I have handed this to someone who is much better at Linux privesc than I am.
I want to ensure that the device does not have a noddy password in Chinese. I.e. whatever the equivalent of "password" "hello" "letmein" etc. would be if you were a electronics factory in Shenzhen.
I am aware that there are multiple Chinese dialects but would be interested in wordlists from any of them as it would be worth a try anyway and they may be useful on similar devices.
TLDR: I have tried Google and had difficulty finding Chinese or "pinyin" wordlists suitable for dictionary attacks. I have searched this site and found some good sources for wordlists which I will probably try next but they are mainly in English and I have not seen any in Chinese.
Does anyone know of a good source for them?
Edit: Further searching has found me this http://www.backtrack-linux.org/forums/showthread.php?t=27764 which I will try. I am unsure if that will provide decent coverage for my purposes though.
Edit 2:
I have posted an ascii seed symbol wordlist generated from the top answer below at http://pastebin.com/aHrnZF57
This should be able to be used to generate wordlists of your desired length by using the "crunch" wordlist generator or your favourite alternative tool.
For example:
Save the raw pastebin data as seed.txt in your home directory then invoke:
crunch MIN MAX -q ~\seed.txt -o myOutputWordlist.txt
The same can be done by substituting my seed list with some of those available from the backtrack-linux forums thread linked above.
Hope this helps anyone with this problem - Happy bruteforcing :)