WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2024 Poal.co

1.3K

(post is archived)

[–] 0 pt

One does not brute force everything one character after the other. First you do a dictionary attack. Then a number attack, then a lowercase letter attack. With some stepping to vary approaches as length increases.

[–] 0 pt

Just add a second or so to each login attempt. This is already done by bcrypt, luks and probably most other sane systems that are also "timing attack" safe (research.kudelskisecurity.com).

[–] 0 pt

This works for remote systems. Once you have local access, or the hashed database, all bets are off.

[–] 0 pt

first you do these series of attacks that aren't brute force

Did you even read my post?

If that were brute force

Five words in and the context is set. "brute force".