bknows wrote: |
You didn't comment on the junk crypted files. You missed an opportunity! |
moner wrote: |
can someone help me understand how password cracking or brute force works? how does a program know that a particular password that has been found is the correct one? e.g say my password was "pass", how would the computer program know that it has hit bulls eye for e.g for a pgp disk or something else...i know it might be basics for most of you but I don't know |
AdamV wrote: |
For example, on a Windows network, when you change your password, it is encrypted and only the encrypted version is stored, never the plaintext. When you log in, your password attempt is encrypted and this is compared with the stored encrypted copy. SO, the cracking tool does the same thing - it makes up a word to try (or a set of random characters) and then encrypts this and compares with the encrypted hash which has either been taken off a server or possibly sniffed from the network. Does that make sense? |
zhx wrote: |
(I guess this is a poor example for the forum, as @ is turned into -at-.) |
output generated using printer-friendly topic mod, All times are GMT + 2 Hours