This page is a permanent link to the reply below and its nested replies. See all post replies »
Elessar · 31-35, M
It simply tries all the combinations until it finds the one that works
a
b
c
..
aa
ab
ac
...
And it's obviously detectable, and impossibly slow if the password is strong enough (12+ characters, upper and lowercase, numbers, symbols, no known words). It's usually performed to figure the key to decrypt local data, not against sites or services that certainly have mitigation measures in place.
a
b
c
..
aa
ab
ac
...
And it's obviously detectable, and impossibly slow if the password is strong enough (12+ characters, upper and lowercase, numbers, symbols, no known words). It's usually performed to figure the key to decrypt local data, not against sites or services that certainly have mitigation measures in place.
SomeMichGuy · M
@Elessar And incredibly inefficient.
A paper from the 1980s? by SRI found that most men used a female's name as their password; knowing all the women in a guy's life (grandmother(s), mom(s), aunt(s), sister(s), wife/wives, daughter(s), granddaughter(s), dogs & other pets...you'd likely guess it.
A paper from the 1980s? by SRI found that most men used a female's name as their password; knowing all the women in a guy's life (grandmother(s), mom(s), aunt(s), sister(s), wife/wives, daughter(s), granddaughter(s), dogs & other pets...you'd likely guess it.