You know them brute force password crackers... Just give the min/max
passwordlength and the character scope in which they have to search.
min length: 1
max length: 7
scope:abcdefghi jklmnopqrstuvwx yzABCDEFGHIJKLM NOPQRSTUVWXYZ01 234567890!@#$%^ &*()_
Can anybody help me with a compact code for generating all possibilities? 7 1906
Hans Worst wrote:
You know them brute force password crackers... Just give the min/max
passwordlength and the character scope in which they have to search.
min length: 1
max length: 7
scope:abcdefghi jklmnopqrstuvwx yzABCDEFGHIJKLM NOPQRSTUVWXYZ01 234567890!@#$%^ &*()_
Can anybody help me with a compact code for generating all possibilities?
You do realize that at the maxlength there are 10,030,613,004, 288
combinations, at that a generation and test rate of 1,000,000 per
second, it would take over 100 days to test them all?
There is a more complicated way, which lets max length be a variable,
but this is short and easy:
for($i1=0; $i1<strlen($sco pe); $i1++) {
$key = substr($scope, $i1, 1);
print $key;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key = substr($key,0,1 ) . substr($scope, $i2, 1);
print $key;
for($i3=0; $i3<strlen(scop e); $i++) {
$key = substr($key,0,2 ) . substr($scope, $i3, 1);
print $key;
}
}
}
Make further loops inside the ones already present to increase the key
length beyond 3. Note that each loop increases the run time and output
lines by a factor of 72
"Bob Stearns" <rs**********@c harter.netschre ef in bericht
news:PU******** ********@newsfe 07.lga...
Hans Worst wrote:
>You know them brute force password crackers... Just give the min/max passwordleng th and the character scope in which they have to search.
min length: 1 max length: 7 scope:abcdefgh ijklmnopqrstuvw xyzABCDEFGHIJKL MNOPQRSTUVWXYZ0 1234567890!@#$% ^&*()_
Can anybody help me with a compact code for generating all possibilities?
You do realize that at the maxlength there are 10,030,613,004, 288
combinations, at that a generation and test rate of 1,000,000 per second,
it would take over 100 days to test them all?
There is a more complicated way, which lets max length be a variable, but
this is short and easy:
for($i1=0; $i1<strlen($sco pe); $i1++) {
$key = substr($scope, $i1, 1);
print $key;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key = substr($key,0,1 ) . substr($scope, $i2, 1);
print $key;
for($i3=0; $i3<strlen(scop e); $i++) {
$key = substr($key,0,2 ) . substr($scope, $i3, 1);
print $key;
}
}
}
Make further loops inside the ones already present to increase the key
length beyond 3. Note that each loop increases the run time and output
lines by a factor of 72
Bob,
Thanks for the example but there is something wrong - I cannot find what
though...
I put $scope = "abcdefghijklmn opqrstuvwxyz";
and I put <BR>'s after every print
The script outputs a aa aaa aaa aaa aaa aaa aaa
"Hans Worst" <ha**@worst.inv alidwrote in message
news:no******** *************** *******@scarlet .biz...
>
"Bob Stearns" <rs**********@c harter.netschre ef in bericht
news:PU******** ********@newsfe 07.lga...
>Hans Worst wrote:
>>You know them brute force password crackers... Just give the min/max passwordlengt h and the character scope in which they have to search.
min length: 1 max length: 7 scope:abcdefg hijklmnopqrstuv wxyzABCDEFGHIJK LMNOPQRSTUVWXYZ 01234567890!@#$ %^&*()_
Can anybody help me with a compact code for generating all possibilities ?
You do realize that at the maxlength there are 10,030,613,004, 288 combinations , at that a generation and test rate of 1,000,000 per second, it would take over 100 days to test them all?
There is a more complicated way, which lets max length be a variable, but this is short and easy:
for($i1=0; $i1<strlen($sco pe); $i1++) { $key = substr($scope, $i1, 1); print $key; for($i2=0; $i2<strlen($sco pe); $i2++) { $key = substr($key,0,1 ) . substr($scope, $i2, 1); print $key; for($i3=0; $i3<strlen(scop e); $i++) { $key = substr($key,0,2 ) . substr($scope, $i3, 1); print $key; } } }
Make further loops inside the ones already present to increase the key length beyond 3. Note that each loop increases the run time and output lines by a factor of 72
Bob,
Thanks for the example but there is something wrong - I cannot find what
though...
I put $scope = "abcdefghijklmn opqrstuvwxyz";
and I put <BR>'s after every print
The script outputs a aa aaa aaa aaa aaa aaa aaa
try indexing the keys as well:
for($i1=0; $i1<strlen($sco pe); $i1++) {
$key1 = $scope{$i1};
print $key1;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key2 = $key1 . $scope{$i2};
print $key2;
for($i3=0; $i3<strlen(scop e); $i++) {
$key3 = $key2 . $scope{$i3};
print $key3;
}
}
}
--
"Ohjelmoija on organismi joka muuttaa kofeiinia koodiksi" - lpk http://outolempi.net/ahdistus/ - Satunnaisesti päivittyvä nettisarjis sp**@outolempi. net || Gedoon-S @ IRCnet || rot13(xv***@bhg byrzcv.arg)
"Kimmo Laine" <sp**@outolempi .netschreef in bericht
news:_t******** ***********@rea der1.news.jippi i.net...
"Hans Worst" <ha**@worst.inv alidwrote in message
news:no******** *************** *******@scarlet .biz...
>> "Bob Stearns" <rs**********@c harter.netschre ef in bericht news:PU******* *********@newsf e07.lga...
>>Hans Worst wrote:
You know them brute force password crackers... Just give the min/max passwordleng th and the character scope in which they have to search.
min length: 1 max length: 7 scope:abcdef ghijklmnopqrstu vwxyzABCDEFGHIJ KLMNOPQRSTUVWXY Z01234567890!@# $%^&*()_
Can anybody help me with a compact code for generating all possibilitie s? You do realize that at the maxlength there are 10,030,613,004, 288 combination s, at that a generation and test rate of 1,000,000 per second, it would take over 100 days to test them all?
There is a more complicated way, which lets max length be a variable, but this is short and easy:
for($i1=0; $i1<strlen($sco pe); $i1++) { $key = substr($scope, $i1, 1); print $key; for($i2=0; $i2<strlen($sco pe); $i2++) { $key = substr($key,0,1 ) . substr($scope, $i2, 1); print $key; for($i3=0; $i3<strlen(scop e); $i++) { $key = substr($key,0,2 ) . substr($scope, $i3, 1); print $key; } } }
Make further loops inside the ones already present to increase the key length beyond 3. Note that each loop increases the run time and output lines by a factor of 72
Bob,
Thanks for the example but there is something wrong - I cannot find what though...
I put $scope = "abcdefghijklmn opqrstuvwxyz"; and I put <BR>'s after every print The script outputs a aa aaa aaa aaa aaa aaa aaa
try indexing the keys as well:
for($i1=0; $i1<strlen($sco pe); $i1++) {
$key1 = $scope{$i1};
print $key1;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key2 = $key1 . $scope{$i2};
print $key2;
for($i3=0; $i3<strlen(scop e); $i++) {
$key3 = $key2 . $scope{$i3};
print $key3;
}
}
}
I still only get aaaaaaaaaaaaaaa aaaaaaaaa...
"Hans Worst" <ha**@worst.inv alidwrote in message
news:_b******** ************@sc arlet.biz...
>
"Kimmo Laine" <sp**@outolempi .netschreef in bericht
news:_t******** ***********@rea der1.news.jippi i.net...
>"Hans Worst" <ha**@worst.inv alidwrote in message news:no******* *************** ********@scarle t.biz...
>>> "Bob Stearns" <rs**********@c harter.netschre ef in bericht news:PU****** **********@news fe07.lga... Hans Worst wrote:
You know them brute force password crackers... Just give the min/max passwordlen gth and the character scope in which they have to search. > min length: 1 max length: 7 scope:abcde fghijklmnopqrst uvwxyzABCDEFGHI JKLMNOPQRSTUVWX YZ01234567890!@ #$%^&*()_ > Can anybody help me with a compact code for generating all possibiliti es? You do realize that at the maxlength there are 10,030,613,004, 288 combinations , at that a generation and test rate of 1,000,000 per second, it would take over 100 days to test them all?
There is a more complicated way, which lets max length be a variable, but this is short and easy:
for($i1=0; $i1<strlen($sco pe); $i1++) { $key = substr($scope, $i1, 1); print $key; for($i2=0; $i2<strlen($sco pe); $i2++) { $key = substr($key,0,1 ) . substr($scope, $i2, 1); print $key; for($i3=0; $i3<strlen(scop e); $i++) { $key = substr($key,0,2 ) . substr($scope, $i3, 1); print $key; } } }
Make further loops inside the ones already present to increase the key length beyond 3. Note that each loop increases the run time and output lines by a factor of 72 Bob,
Thanks for the example but there is something wrong - I cannot find what though...
I put $scope = "abcdefghijklmn opqrstuvwxyz"; and I put <BR>'s after every print The script outputs a aa aaa aaa aaa aaa aaa aaa try indexing the keys as well:
for($i1=0; $i1<strlen($sco pe); $i1++) { $key1 = $scope{$i1}; print $key1; for($i2=0; $i2<strlen($sco pe); $i2++) { $key2 = $key1 . $scope{$i2}; print $key2; for($i3=0; $i3<strlen(scop e); $i++) { $key3 = $key2 . $scope{$i3}; print $key3; } } }
I still only get aaaaaaaaaaaaaaa aaaaaaaaa...
Strange... I just tried this:
$scope = 'abcdef';
for($i1=0; $i1<strlen($sco pe); $i1++) {
$key1 = $scope{$i1};
print $key1.'<br>';
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key2 = $key1 . $scope{$i2};
print $key2.'<br>';
for($i3=0; $i3<strlen($sco pe); $i3++) {
$key3 = $key2 . $scope{$i3};
print $key3.'<br>';
}
}
}
And it prints
a
aa
aaa
aab
aac
aad
aae
aaf
ab
aba
abb
abc
abd
abe
abf
ac
aca
acb
acc
acd
ace
acf
....
and so on...
and so on....-- "Ohjelmoija on organismi joka muuttaa kofeiinia
koodiksi" - lpkhttp://outolempi.net/ahdistus/ - Satunnaisesti päivittyvä ne************* @outolempi.net || Gedoon-S @ IRCnet ||
rot13(xv***@bhg byrzcv.arg)
On Mon, 2 Oct 2006 09:34:13 +0800, "Hans Worst" <ha**@worst.inv alidwrote:
>You know them brute force password crackers... Just give the min/max passwordleng th and the character scope in which they have to search.
min length: 1 max length: 7 scope:abcdefgh ijklmnopqrstuvw xyzABCDEFGHIJKL MNOPQRSTUVWXYZ0 1234567890!@#$% ^&*()_
Can anybody help me with a compact code for generating all possibilities?
I don't know what you are trying to accomplish with this, maybe trying to crack web sites with brute
force method??
It's easy to write the algorythm to do this however - the memory variable will time out and you will
be building a string so gigantic you will run out of system memory.
You are using the wrong tool for an online password cracker
In article <PU************ ****@newsfe07.l ga>, Bob Stearns
<rs**********@c harter.netwrote :
for($i1=0; $i1<strlen($sco pe); $i1++) {
$key = substr($scope, $i1, 1);
print $key;
for($i2=0; $i2<strlen($sco pe); $i2++) {
$key = substr($key,0,1 ) . substr($scope, $i2, 1);
print $key;
for($i3=0; $i3<strlen(scop e); $i++) {
$key = substr($key,0,2 ) . substr($scope, $i3, 1);
print $key;
}
}
}
This script is *much* slower than it has to be. In every loop
iteration, strlen is being recalculated. You could simply assign $len
to strlen($scope) and reference $len through your example to save some
processing time.
$len = strlen( $scope );
for( $i1 = 0; $i1 < $len; $x++ ) {
// stuff ..
}
--
Koncept <<
"The snake that cannot shed its skin perishes. So do the spirits who are
prevented from changing their opinions; they cease to be a spirit." -Nietzsche This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Lauren Wilson |
last post by:
Does anyone know how the following info is extracted from the user's
computer by a Front Page form?
HTTP User Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US;
rv:1.7.5) Gecko/20041107 Firefox/1.0
I only ask because I believe I could use the same info as part of a
scheme to generate a unique (or at least less common) serialized id...
|
by: darin dimitrov |
last post by:
Hello,
I need help with an algoritm that given a set of "n" distinct
numbers will
generate all the possible permutations of fixed length "m" of these
numbers WITH repetitions (a total of n^m possibilities). For example:
given the set {1, 2} would output: 111,112,121,122,211,212,221,222 if
we fix m=3.
|
by: John Grandy |
last post by:
Is it possible to generate a 20 byte integer from a GUID that is "unique
enough" ( just like a GUID is not truly unique , but is "unique enough" ).
We identify transactions with GUIDs , but a partner web service has a 20
byte limit on transaction ID passed.
|
by: vm98123 |
last post by:
Hi,
could someone please give me a clue to this one:
I do have an xml-File and an xslt-File so that a browser can display
the xml-file.
What I am trying to do is convert this to pdf or tiff.
I know that with fop you can convert xml + xsl-fo to pdf.
|
by: Anthony Liu |
last post by:
I am at my wit's end.
I want to generate a certain number of random numbers.
This is easy, I can repeatedly do uniform(0, 1) for
example.
But, I want the random numbers just generated sum up
to 1 .
I am not sure how to do this. Any idea? Thanks.
| |
by: Daniel Hilgarth |
last post by:
Hello,
I am currently trying to use XSLT for the creation of multiple
HTML-files from a single XML-File.
This HTML-files need to have links to each other.
The following information might be important:
There are some special nodes that will start a new HTML-page
("page-nodes"). Those nodes can be nested.
Those nodes have an attribute...
|
by: MLH |
last post by:
If 3 things can be in one of 2 states,
the number of possible combinations
is equal to 2^3.
But if I have 3 things, 2 of which can
be in 2 states and the other in 3 states,
what's the simplest expression that will
accurately compute the permutationjs
possible?
|
by: Nate |
last post by:
Hello,
I am looking for a method to automatically declare variables in C.
I'm not sure if there is a good way to do this, but I had something
like this in mind...
int i;
for(i = 1; i < 4; i++){
|
by: Jon Harrop |
last post by:
xahlee@gmail.com wrote:
This does not even start running in Mathematica 6, let alone produce any
correct results. The first line was deprecated some time ago. I don't know
what is wrong with the rest of your program but it takes a while to produce
the empty list.
Then your program should produce an infinite number of terms, e.g. x,...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
| |
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
| |
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |