Vulnerability Development mailing list archives

Re: AOL passwords / crypt() and online brute forcing


From: gotcha <fmu () hushmail com>
Date: Wed, 1 May 2002 22:39:14 +0200

On Wed, May 01, 2002 at 12:20:44PM -0500, Erik Parker wrote:
if you take the 94 displayable ascii characters.. and do 94^8
you have a possible 6,095,689,385,410,816..  So about 6 quadrillion
passwords to try..

i think that's not the issue. the real problem is that people think
they can block access by changing a password from foobar111 to foobar123.

--gotcha


Current thread: