IYpi3tbduwbfwm

Such a password can't be cracked by brute force.

... and it's easy to remember.

If Your password is 3 times better, don't use words brute force won't
matter.

I use to use SUCH passwords.

;)


On Fri, 2005-08-26 at 08:46 +0000, Fernando Meira wrote:
> On 8/26/05, Frank Schafer <[EMAIL PROTECTED]> wrote:
>         On Fri, 2005-08-26 at 07:50 +0200, Dirk Heinrichs wrote:
>         > Am Donnerstag, 25. August 2005 18:21 schrieb ext Willie
>         Wong:
>         >
>         > > Your best bet is to get someone your trust to boot into
>         single for you
>         > > and reset the password there.
>         >
>         > Single wouldn't work, You still get a login: prompt. The
>         only ways to get at
>         > it are LiveCD or booting with "init=/bin/bash".
>         >
>         > Bye... 
>         >
>         >       Dirk
>         
>         Right. Due to the fact that he got a new password, I think
>         they did it
>         exactly that way (LifeCD or boot disc).
>         
>         There is no official hack to get the password out of the
>         machine. It is 
>         nowhere stored in uncrypted form and the crypting algorithm
>         itself is
>         not reversable.
> 
> Not the best way to do it, but getting the crypted form of the root
> pass and using it for a brute-force attack wouldn't get a good result?
> By good result I mean a positive match within a short period of time!
> Of course I assume for that, that he had an idea of what was the
> password like.. number of characters, use of symbols, and so, so that
> he could apply the attack as nearer of the real pass as possible..
> would this be a possible way to do it?
> 
> 
> 
> 
-- 
gentoo-user@gentoo.org mailing list

Reply via email to