to every TPT user

  • Racer-Delux
    8th Mar 2011 Member 0 Permalink
    Many hackers do not bother to dehash a password. They will use a brute force logger. For websites that do not have login attempt limits, it is just a matter of time before the account is hacked.

    Note: Using symbols and other gibberish will greatly improve the time it takes for a brute force hacker to get through, but know that given enough time, even a 100 digit password can be cracked using this method.
  • MasterMind555
    8th Mar 2011 Member 0 Permalink

    antb:



    Dehash these:

    caca


    WTF
    That means sh** in French
    My password is different in here and all my other accs BTW
  • Felix
    8th Mar 2011 Member 0 Permalink

    Racer-Delux:

    Many hackers do not bother to dehash a password. They will use a brute force logger. For websites that do not have login attempt limits, it is just a matter of time before the account is hacked.

    Note: Using symbols and other gibberish will greatly improve the time it takes for a brute force hacker to get through, but know that given enough time, even a 100 digit password can be cracked using this method.

    And how would a brute force "logger"(do you even know what that usually implies?) be more efficient than "dehashing" a hash.
  • Racer-Delux
    8th Mar 2011 Member 0 Permalink
    @Felix

    It simply guesses every single combination of letters and symbols possible at a very high rate (not sure of the # per second, but its high). It starts at simple and moves to complex (which is why longer passwords would take longer). This method is very low tec - but very effective (not time effective).

    A decent password would take about half day to day to crack - and requires little work on the user side.
  • OnTheToilet
    8th Mar 2011 Member 0 Permalink
    i was just saying that its like saying where the bank vault key is.
  • Xenocide
    8th Mar 2011 Former Staff 0 Permalink
    @felix
    Hence I lol'd at it, pilojo said it initally.

    an identical hash can be generated by several completely different files and strings, its pretty hard to be able to accurately reverse the hash back to its original form.