Bruce Byfield wrote:

> The point isn't whether it can break a particular password

If GRS selected a weak password such as "[EMAIL PROTECTED]", then it should have been cracked within 48 hours. If he selected a strong password, then it would take longer --- much longer. [ "[EMAIL PROTECTED]" is a dictionary word, for those who are wondering why it is a weak password.]

it's how effective it could be on the average password people use.

The web site implied it was optimized for brute force attacks. Assuming that the password frequency dictionaries are still available, use several of them, then run thru the user dictionaries, and regular dictionaries, then start your brute force, try every possible combination of characters attack.

xan

jonathon

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to