1 |
IYpi3tbduwbfwm |
2 |
|
3 |
Such a password can't be cracked by brute force. |
4 |
|
5 |
... and it's easy to remember. |
6 |
|
7 |
If Your password is 3 times better, don't use words brute force won't |
8 |
matter. |
9 |
|
10 |
I use to use SUCH passwords. |
11 |
|
12 |
;) |
13 |
|
14 |
|
15 |
On Fri, 2005-08-26 at 08:46 +0000, Fernando Meira wrote: |
16 |
> On 8/26/05, Frank Schafer <frank.schafer@×××××××××.cz> wrote: |
17 |
> On Fri, 2005-08-26 at 07:50 +0200, Dirk Heinrichs wrote: |
18 |
> > Am Donnerstag, 25. August 2005 18:21 schrieb ext Willie |
19 |
> Wong: |
20 |
> > |
21 |
> > > Your best bet is to get someone your trust to boot into |
22 |
> single for you |
23 |
> > > and reset the password there. |
24 |
> > |
25 |
> > Single wouldn't work, You still get a login: prompt. The |
26 |
> only ways to get at |
27 |
> > it are LiveCD or booting with "init=/bin/bash". |
28 |
> > |
29 |
> > Bye... |
30 |
> > |
31 |
> > Dirk |
32 |
> |
33 |
> Right. Due to the fact that he got a new password, I think |
34 |
> they did it |
35 |
> exactly that way (LifeCD or boot disc). |
36 |
> |
37 |
> There is no official hack to get the password out of the |
38 |
> machine. It is |
39 |
> nowhere stored in uncrypted form and the crypting algorithm |
40 |
> itself is |
41 |
> not reversable. |
42 |
> |
43 |
> Not the best way to do it, but getting the crypted form of the root |
44 |
> pass and using it for a brute-force attack wouldn't get a good result? |
45 |
> By good result I mean a positive match within a short period of time! |
46 |
> Of course I assume for that, that he had an idea of what was the |
47 |
> password like.. number of characters, use of symbols, and so, so that |
48 |
> he could apply the attack as nearer of the real pass as possible.. |
49 |
> would this be a possible way to do it? |
50 |
> |
51 |
> |
52 |
> |
53 |
> |
54 |
-- |
55 |
gentoo-user@g.o mailing list |