473,587 Members | 2,524 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Generate all possibilities

You know them brute force password crackers... Just give the min/max
passwordlength and the character scope in which they have to search.

min length: 1
max length: 7
scope:abcdefghi jklmnopqrstuvwx yzABCDEFGHIJKLM NOPQRSTUVWXYZ01 234567890!@#$%^ &*()_

Can anybody help me with a compact code for generating all possibilities?
Oct 2 '06 #1
7 1906
Hans Worst wrote:
You know them brute force password crackers... Just give the min/max
passwordlength and the character scope in which they have to search.

min length: 1
max length: 7
scope:abcdefghi jklmnopqrstuvwx yzABCDEFGHIJKLM NOPQRSTUVWXYZ01 234567890!@#$%^ &*()_

Can anybody help me with a compact code for generating all possibilities?

You do realize that at the maxlength there are 10,030,613,004, 288
combinations, at that a generation and test rate of 1,000,000 per
second, it would take over 100 days to test them all?

There is a more complicated way, which lets max length be a variable,
but this is short and easy:

for($i1=0; $i1<strlen($sco pe); $i1++) {
$key = substr($scope, $i1, 1);
print $key;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key = substr($key,0,1 ) . substr($scope, $i2, 1);
print $key;
for($i3=0; $i3<strlen(scop e); $i++) {
$key = substr($key,0,2 ) . substr($scope, $i3, 1);
print $key;
}
}
}

Make further loops inside the ones already present to increase the key
length beyond 3. Note that each loop increases the run time and output
lines by a factor of 72
Oct 2 '06 #2

"Bob Stearns" <rs**********@c harter.netschre ef in bericht
news:PU******** ********@newsfe 07.lga...
Hans Worst wrote:
>You know them brute force password crackers... Just give the min/max
passwordleng th and the character scope in which they have to search.

min length: 1
max length: 7
scope:abcdefgh ijklmnopqrstuvw xyzABCDEFGHIJKL MNOPQRSTUVWXYZ0 1234567890!@#$% ^&*()_

Can anybody help me with a compact code for generating all possibilities?
You do realize that at the maxlength there are 10,030,613,004, 288
combinations, at that a generation and test rate of 1,000,000 per second,
it would take over 100 days to test them all?

There is a more complicated way, which lets max length be a variable, but
this is short and easy:

for($i1=0; $i1<strlen($sco pe); $i1++) {
$key = substr($scope, $i1, 1);
print $key;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key = substr($key,0,1 ) . substr($scope, $i2, 1);
print $key;
for($i3=0; $i3<strlen(scop e); $i++) {
$key = substr($key,0,2 ) . substr($scope, $i3, 1);
print $key;
}
}
}

Make further loops inside the ones already present to increase the key
length beyond 3. Note that each loop increases the run time and output
lines by a factor of 72
Bob,

Thanks for the example but there is something wrong - I cannot find what
though...

I put $scope = "abcdefghijklmn opqrstuvwxyz";
and I put <BR>'s after every print
The script outputs a aa aaa aaa aaa aaa aaa aaa
Oct 2 '06 #3
"Hans Worst" <ha**@worst.inv alidwrote in message
news:no******** *************** *******@scarlet .biz...
>
"Bob Stearns" <rs**********@c harter.netschre ef in bericht
news:PU******** ********@newsfe 07.lga...
>Hans Worst wrote:
>>You know them brute force password crackers... Just give the min/max
passwordlengt h and the character scope in which they have to search.

min length: 1
max length: 7
scope:abcdefg hijklmnopqrstuv wxyzABCDEFGHIJK LMNOPQRSTUVWXYZ 01234567890!@#$ %^&*()_

Can anybody help me with a compact code for generating all
possibilities ?
You do realize that at the maxlength there are 10,030,613,004, 288
combinations , at that a generation and test rate of 1,000,000 per second,
it would take over 100 days to test them all?

There is a more complicated way, which lets max length be a variable, but
this is short and easy:

for($i1=0; $i1<strlen($sco pe); $i1++) {
$key = substr($scope, $i1, 1);
print $key;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key = substr($key,0,1 ) . substr($scope, $i2, 1);
print $key;
for($i3=0; $i3<strlen(scop e); $i++) {
$key = substr($key,0,2 ) . substr($scope, $i3, 1);
print $key;
}
}
}

Make further loops inside the ones already present to increase the key
length beyond 3. Note that each loop increases the run time and output
lines by a factor of 72
Bob,

Thanks for the example but there is something wrong - I cannot find what
though...

I put $scope = "abcdefghijklmn opqrstuvwxyz";
and I put <BR>'s after every print
The script outputs a aa aaa aaa aaa aaa aaa aaa
try indexing the keys as well:

for($i1=0; $i1<strlen($sco pe); $i1++) {
$key1 = $scope{$i1};
print $key1;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key2 = $key1 . $scope{$i2};
print $key2;
for($i3=0; $i3<strlen(scop e); $i++) {
$key3 = $key2 . $scope{$i3};
print $key3;
}
}
}

--
"Ohjelmoija on organismi joka muuttaa kofeiinia koodiksi" - lpk
http://outolempi.net/ahdistus/ - Satunnaisesti päivittyvä nettisarjis
sp**@outolempi. net || Gedoon-S @ IRCnet || rot13(xv***@bhg byrzcv.arg)
Oct 2 '06 #4

"Kimmo Laine" <sp**@outolempi .netschreef in bericht
news:_t******** ***********@rea der1.news.jippi i.net...
"Hans Worst" <ha**@worst.inv alidwrote in message
news:no******** *************** *******@scarlet .biz...
>>
"Bob Stearns" <rs**********@c harter.netschre ef in bericht
news:PU******* *********@newsf e07.lga...
>>Hans Worst wrote:

You know them brute force password crackers... Just give the min/max
passwordleng th and the character scope in which they have to search.

min length: 1
max length: 7
scope:abcdef ghijklmnopqrstu vwxyzABCDEFGHIJ KLMNOPQRSTUVWXY Z01234567890!@# $%^&*()_

Can anybody help me with a compact code for generating all
possibilitie s?
You do realize that at the maxlength there are 10,030,613,004, 288
combination s, at that a generation and test rate of 1,000,000 per
second, it would take over 100 days to test them all?

There is a more complicated way, which lets max length be a variable,
but this is short and easy:

for($i1=0; $i1<strlen($sco pe); $i1++) {
$key = substr($scope, $i1, 1);
print $key;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key = substr($key,0,1 ) . substr($scope, $i2, 1);
print $key;
for($i3=0; $i3<strlen(scop e); $i++) {
$key = substr($key,0,2 ) . substr($scope, $i3, 1);
print $key;
}
}
}

Make further loops inside the ones already present to increase the key
length beyond 3. Note that each loop increases the run time and output
lines by a factor of 72
Bob,

Thanks for the example but there is something wrong - I cannot find what
though...

I put $scope = "abcdefghijklmn opqrstuvwxyz";
and I put <BR>'s after every print
The script outputs a aa aaa aaa aaa aaa aaa aaa

try indexing the keys as well:

for($i1=0; $i1<strlen($sco pe); $i1++) {
$key1 = $scope{$i1};
print $key1;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key2 = $key1 . $scope{$i2};
print $key2;
for($i3=0; $i3<strlen(scop e); $i++) {
$key3 = $key2 . $scope{$i3};
print $key3;
}
}
}
I still only get aaaaaaaaaaaaaaa aaaaaaaaa...
Oct 2 '06 #5
"Hans Worst" <ha**@worst.inv alidwrote in message
news:_b******** ************@sc arlet.biz...
>
"Kimmo Laine" <sp**@outolempi .netschreef in bericht
news:_t******** ***********@rea der1.news.jippi i.net...
>"Hans Worst" <ha**@worst.inv alidwrote in message
news:no******* *************** ********@scarle t.biz...
>>>
"Bob Stearns" <rs**********@c harter.netschre ef in bericht
news:PU****** **********@news fe07.lga...
Hans Worst wrote:

You know them brute force password crackers... Just give the min/max
passwordlen gth and the character scope in which they have to search.
>
min length: 1
max length: 7
scope:abcde fghijklmnopqrst uvwxyzABCDEFGHI JKLMNOPQRSTUVWX YZ01234567890!@ #$%^&*()_
>
Can anybody help me with a compact code for generating all
possibiliti es?
You do realize that at the maxlength there are 10,030,613,004, 288
combinations , at that a generation and test rate of 1,000,000 per
second, it would take over 100 days to test them all?

There is a more complicated way, which lets max length be a variable,
but this is short and easy:

for($i1=0; $i1<strlen($sco pe); $i1++) {
$key = substr($scope, $i1, 1);
print $key;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key = substr($key,0,1 ) . substr($scope, $i2, 1);
print $key;
for($i3=0; $i3<strlen(scop e); $i++) {
$key = substr($key,0,2 ) . substr($scope, $i3, 1);
print $key;
}
}
}

Make further loops inside the ones already present to increase the key
length beyond 3. Note that each loop increases the run time and output
lines by a factor of 72
Bob,

Thanks for the example but there is something wrong - I cannot find what
though...

I put $scope = "abcdefghijklmn opqrstuvwxyz";
and I put <BR>'s after every print
The script outputs a aa aaa aaa aaa aaa aaa aaa

try indexing the keys as well:

for($i1=0; $i1<strlen($sco pe); $i1++) {
$key1 = $scope{$i1};
print $key1;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key2 = $key1 . $scope{$i2};
print $key2;
for($i3=0; $i3<strlen(scop e); $i++) {
$key3 = $key2 . $scope{$i3};
print $key3;
}
}
}
I still only get aaaaaaaaaaaaaaa aaaaaaaaa...
Strange... I just tried this:

$scope = 'abcdef';
for($i1=0; $i1<strlen($sco pe); $i1++) {
$key1 = $scope{$i1};
print $key1.'<br>';
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key2 = $key1 . $scope{$i2};
print $key2.'<br>';
for($i3=0; $i3<strlen($sco pe); $i3++) {
$key3 = $key2 . $scope{$i3};
print $key3.'<br>';
}
}
}

And it prints
a
aa
aaa
aab
aac
aad
aae
aaf
ab
aba
abb
abc
abd
abe
abf
ac
aca
acb
acc
acd
ace
acf
....

and so on...
and so on....-- "Ohjelmoija on organismi joka muuttaa kofeiinia
koodiksi" - lpkhttp://outolempi.net/ahdistus/ - Satunnaisesti päivittyvä
ne************* @outolempi.net || Gedoon-S @ IRCnet ||
rot13(xv***@bhg byrzcv.arg)
Oct 2 '06 #6
On Mon, 2 Oct 2006 09:34:13 +0800, "Hans Worst" <ha**@worst.inv alidwrote:
>You know them brute force password crackers... Just give the min/max
passwordleng th and the character scope in which they have to search.

min length: 1
max length: 7
scope:abcdefgh ijklmnopqrstuvw xyzABCDEFGHIJKL MNOPQRSTUVWXYZ0 1234567890!@#$% ^&*()_

Can anybody help me with a compact code for generating all possibilities?
I don't know what you are trying to accomplish with this, maybe trying to crack web sites with brute
force method??

It's easy to write the algorythm to do this however - the memory variable will time out and you will
be building a string so gigantic you will run out of system memory.

You are using the wrong tool for an online password cracker
Oct 2 '06 #7
In article <PU************ ****@newsfe07.l ga>, Bob Stearns
<rs**********@c harter.netwrote :
for($i1=0; $i1<strlen($sco pe); $i1++) {
$key = substr($scope, $i1, 1);
print $key;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key = substr($key,0,1 ) . substr($scope, $i2, 1);
print $key;
for($i3=0; $i3<strlen(scop e); $i++) {
$key = substr($key,0,2 ) . substr($scope, $i3, 1);
print $key;
}
}
}
This script is *much* slower than it has to be. In every loop
iteration, strlen is being recalculated. You could simply assign $len
to strlen($scope) and reference $len through your example to save some
processing time.

$len = strlen( $scope );
for( $i1 = 0; $i1 < $len; $x++ ) {
// stuff ..
}

--
Koncept <<
"The snake that cannot shed its skin perishes. So do the spirits who are
prevented from changing their opinions; they cease to be a spirit." -Nietzsche
Oct 10 '06 #8

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

29
3722
by: Lauren Wilson | last post by:
Does anyone know how the following info is extracted from the user's computer by a Front Page form? HTTP User Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.5) Gecko/20041107 Firefox/1.0 I only ask because I believe I could use the same info as part of a scheme to generate a unique (or at least less common) serialized id...
4
8194
by: darin dimitrov | last post by:
Hello, I need help with an algoritm that given a set of "n" distinct numbers will generate all the possible permutations of fixed length "m" of these numbers WITH repetitions (a total of n^m possibilities). For example: given the set {1, 2} would output: 111,112,121,122,211,212,221,222 if we fix m=3.
26
11530
by: John Grandy | last post by:
Is it possible to generate a 20 byte integer from a GUID that is "unique enough" ( just like a GUID is not truly unique , but is "unique enough" ). We identify transactions with GUIDs , but a partner web service has a 20 byte limit on transaction ID passed.
13
2940
by: vm98123 | last post by:
Hi, could someone please give me a clue to this one: I do have an xml-File and an xslt-File so that a browser can display the xml-file. What I am trying to do is convert this to pdf or tiff. I know that with fop you can convert xml + xsl-fo to pdf.
14
9870
by: Anthony Liu | last post by:
I am at my wit's end. I want to generate a certain number of random numbers. This is easy, I can repeatedly do uniform(0, 1) for example. But, I want the random numbers just generated sum up to 1 . I am not sure how to do this. Any idea? Thanks.
1
3641
by: Daniel Hilgarth | last post by:
Hello, I am currently trying to use XSLT for the creation of multiple HTML-files from a single XML-File. This HTML-files need to have links to each other. The following information might be important: There are some special nodes that will start a new HTML-page ("page-nodes"). Those nodes can be nested. Those nodes have an attribute...
22
4873
by: MLH | last post by:
If 3 things can be in one of 2 states, the number of possible combinations is equal to 2^3. But if I have 3 things, 2 of which can be in 2 states and the other in 3 states, what's the simplest expression that will accurately compute the permutationjs possible?
111
4601
by: Nate | last post by:
Hello, I am looking for a method to automatically declare variables in C. I'm not sure if there is a good way to do this, but I had something like this in mind... int i; for(i = 1; i < 4; i++){
0
147
by: Jon Harrop | last post by:
xahlee@gmail.com wrote: This does not even start running in Mathematica 6, let alone produce any correct results. The first line was deprecated some time ago. I don't know what is wrong with the rest of your program but it takes a while to produce the empty list. Then your program should produce an infinite number of terms, e.g. x,...
0
7918
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
0
8340
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
0
8220
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
0
6621
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
1
5713
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes...
0
5392
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert...
0
3840
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
1
2353
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
1
1452
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.