On Wednesday 29 December 2004 09:58, Kyrre Ness Sjobak
<kyrre(a)solution-forge.net> wrote:
man, 27.12.2004 kl. 18.01 skrev Russell Coker:
> On Friday 17 December 2004 08:19, Paul Iadonisi <pri.rhl3(a)iadonisi.to>
wrote:
> > Maybe the new dual Opteron box I just ordered can crack
the passwords
> > for both our keys. ;-)
>
> I wrote a program to crack keys with a hacked version of gpg (at the
> point in the code where it asks for the pass-phrase my code inserted a
> loop to go through the passwords). It's ugly but with the recent
> versions of gpg it works reasonably well (I discovered a memory leak
> whereby gpg would lose a couple of hundred bytes every attempt at a
> pass-phrase).
What if it tried a dictionary first?
Using a dictionary might get a faster attack or make cracking a long password
feasible. But surely no-one is using a password that would be so easily
cracked...
--
http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/ Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/ My home page