passwords! (including long passwords with poor entropy)

coderman coderman at gmail.com
Wed Nov 13 00:35:32 PST 2013


On Tue, Nov 12, 2013 at 6:08 PM, brian carroll
<electromagnetize at gmail.com> wrote:
>...
> yet what if the passwords 'length' were not the issue, such that a 20
> character string (of several number.words with several intermixed
> special characters) could still be successfully attacked, given those
> limited parameters.

this summer oclHashCat-plus got an upgrade (experimental) for support
to 64 characters of search space (55 or more depending on algo).

obviously this length implies a more intelligent / direct search
through the key space, which, if limited to a much smaller character
set, becomes practically attack-able...


in fact, optimizing the path of a dict cruncher like oclHashCat or
Hashkill for best performance against a particular target set is an
enjoyable art unto itself ;)



More information about the cypherpunks mailing list