Page 2 of 2

Re: Random Number generator

Posted: Tue Oct 28, 2008 8:45 pm
by MarauderIIC
Brute forcing a password will get you nowhere. If it's just five characters long and can be a-z, A-Z, 0-9, and the 32 symbols on the kb (I think, quick count), then there are

26 + 26 + 10 + 32 = 52 + 42 = 94 possibilities for each character, so you have a total of
94 * 94 * 94 * 94 * 94 = 7339040224 different password possibilities
94 possibilities for the first char can be paired with any of the 94 chars in the second char and any of those can be paired with the 94 chars of the third, etc (hence the multiplication).

Of course, if you don't know the length, it's even harder. The problem is quickly becomes infeasible due to time -- send & check response, not to mention the password generation itself.

Re: Random Number generator

Posted: Tue Oct 28, 2008 9:06 pm
by NeonNinja♦
Oh :lol: I understood some of it, but i guess its not worth it lol :P

Re: Random Number generator

Posted: Wed Oct 29, 2008 2:37 pm
by dandymcgee
Just a quick note: It's probably in your best interest to use cin.get(); as opposed to system("PAUSE"); when wanting a console application to wait for user input.

Re: Random Number generator

Posted: Wed Oct 29, 2008 2:39 pm
by Falco Girgis
Yeah, "system()" is not platform independent.

Re: Random Number generator

Posted: Mon Nov 03, 2008 9:23 am
by avansc
MarauderIIC wrote:Brute forcing a password will get you nowhere. If it's just five characters long and can be a-z, A-Z, 0-9, and the 32 symbols on the kb (I think, quick count), then there are

26 + 26 + 10 + 32 = 52 + 42 = 94 possibilities for each character, so you have a total of
94 * 94 * 94 * 94 * 94 = 7339040224 different password possibilities
94 possibilities for the first char can be paired with any of the 94 chars in the second char and any of those can be paired with the 94 chars of the third, etc (hence the multiplication).

Of course, if you don't know the length, it's even harder. The problem is quickly becomes infeasible due to time -- send & check response, not to mention the password generation itself.
this is generally true, but it depends what password you are trying to crack. let say its a windowsXp user password. there is a file called the sam file, its in the windows/system/somewhere folder. anyways, this contains the passwords. but it contains the has of the passwords. well not exactly. if the password is less than 14 chars. its actually just encrypted with DES and the secret key windows uses is known, so cracking that password is pretty easy. and if its longet is is an actual has i think its called the NT LM hash. but is still very easily cracked.

there is a program called lophtcrack. will get you the passwords in a day or so.

and getting the sam file is not that hard.