OZONE Asylum
Forums
OZONE
Let's talk about computer security for a moment
This page's ID:
27664
Search
QuickChanges
Forums
FAQ
Archives
Register
Edit Post
Who can edit a post?
The poster and administrators may edit a post. The poster can only edit it for a short while after the initial post.
Your User Name:
Your Password:
Login Options:
Remember Me On This Computer
Your Text:
Insert Slimies »
Insert UBB Code »
Close
Last Tag
|
All Tags
UBB Help
[quote] [b]TwoD said:[/b] Who knows, bruteforcing doesn't have to be linear, you can make random jumps too and hpe you get lucky.[/quote] You always hope to get lucky when brute forcing. I don't see how random jumps would help, rather the opposite, since there is a probability that you try the same key twice (or more). [quote]Also there are combinations of bruteforcing and dictionary attacks that might be more effective.[/quote] A good passphrase would never be vulnerable to dictionary/hybrid attacks. [quote]Anyway, you'd still get the passphrase some day, be it still in use or not.[/quote] Yes, but the probability that you find a good passphrase during your lifetime is close to non-existent. [quote]Some companies tend to use things like "password1" and then just move on to "password2" after say a month. You might be able to guess the current pass based on the pass you found.[/quote] Yes, this is why companies should have good password policies, which forbids this.
Loading...
Options:
Enable Slimies
Enable Linkwords
« Backwards
—
Onwards »