OZONE Asylum
Forums
OZONE
Let's talk about computer security for a moment
This page's ID:
27664
Search
QuickChanges
Forums
FAQ
Archives
Register
Edit Post
Who can edit a post?
The poster and administrators may edit a post. The poster can only edit it for a short while after the initial post.
Your User Name:
Your Password:
Login Options:
Remember Me On This Computer
Your Text:
Insert Slimies »
Insert UBB Code »
Close
Last Tag
|
All Tags
UBB Help
[quote] [b]HZR said:[/b] Yes, hence it will not be effective, as in, there is no reason to do it, because by the time the plaintext is found you won't be able to use it. [/quote] Who knows, bruteforcing doesn't have to be linear, you can make random jumps too and hpe you get lucky. Also there are combinations of bruteforcing and dictionary attacks that might be more effective. Anyway, you'd still get the passphrase some day, be it still in use or not. Some companies tend to use things like "password1" and then just move on to "password2" after say a month. You might be able to guess the current pass based on the pass you found. It's also possible that they simply don't change the pass. :rolleyes: Heck, it might take you a hundred years to crack the pass, but if you're a "ûber 1337" hacker, you might also be familiar with distributive processing. I find that scene in Operation Takedown, where Mitnick takes command of the whole computer pool to do his dirty work, hilarious. :D /TwoD
Loading...
Options:
Enable Slimies
Enable Linkwords
« Backwards
—
Onwards »