>>2
That doesn't apply here, Faggotron-3000. >>1-closet-homosexual clearly generates his passwords randomly and stores them somewhere other than his mind.
How would a dictionary attack program know your password contains 2 dictionary words, all lower case, followed by a 3-digit number? It doesn't. It has to try all the possibilities.
Name:
Anonymous2012-12-14 8:49
>>5
Rainbow tables, with dictionary translation. Faster than with the same table, having something like this:
.*&馬ζηιτ101
>>5
I think 123 and 321 are so common you might as well check them first. I don't think the pattern (word1)(word2)123 is too uncommon.
Name:
Anonymous2012-12-14 9:15
>>7
It is. So much ,I present you the most prevalent human password function: digits = random (time())%2
if (digit == 0)
for i = 1; {1-9*} ({a-z*,A-Z*} x i);i++;
else
for i = 1; ({a-z*,A-Z*} x i) {1-9*};i++;
endif
for i = 1; {1-9*}{a-z,A-Z}*i*{1-9*};i++;
1337 dictionary is all set as well. Symbols like ~|'"?/<>$&@* are also in my 1337 dictinary tables.
Name:
82012-12-14 9:20
noted the last one incorrect. It should be something like for i = 1; {1-9*}({a-z*,A-Z*} x i) {1-9*};i++;
and i is number of words. Usually 1-3 is a good estimate. 4 for the stretchers, but I never meet one with 5 words.
Name:
Anonymous2012-12-14 9:49
>>8 >>9
But you're right, password checkers are a solution to a problem which shouldn't exist. The only passwords that should exist ought to be GUIDs, as long it possible to copy paste that is, so exceptions for OS login, telephones etc.
>>10
If you can't remember it, that means you have to save it someplace—on a file or on a piece of paper. This simplifies the attacker's plan of action.