If you start bruteforcing now you'll be done in a few million years.
You're fucked. There's a reason AES is an international encryption standard.
Name:
Anonymous2008-09-07 6:04
i pretty sure the password only has 19 unique character two of witch are numbers but i could any where from 8 up to 39 character long
does any one know a password generator that will string together dictionary words and add numbers in between them because i found a java-app that that will test passwords from a txt file but i need to make the password list.
dic = open('/usr/share/dict/words')
for word1 in dic:
for word2 in dic:
for i in range(10, 100):
print word1 + i + word2
My words file has 98,569 entries, so that will generate a list of 864,710,450,729 potential passwords.
That's assuming you aren't doing anything fancy with capitalisation.
Name:
Anonymous2008-09-07 22:27
Incidentally, that password file will be 16.4 TB, so you may want to do something more clever than just dumping stdout to a file. It shouldn't take more than a few hundred years to crack, though.
Good luck!
Name:
Anonymous2008-09-07 23:32
op here
i know what the numbers are so that would cut the potential passwords down a lot
but how would i change the script to just insert '36' into the string instread of a ramdom number between 10 and 100
and the characters available are 'abcefghlmnorstuwz' so instead of any words just ones that contain only these characters will be strung together
one more thing is that the password could be up to 10 words (with the word 'the' repeating up to 4 times) long plus the numbers
Name:
Anonymous2008-09-08 0:15
>>10
Give it up, dude. You aren't getting your files back.
>>16
Welcome to three weeks ago. We've had this entire discussion already.
Name:
Anonymous2008-09-30 0:17
needs more quantam computing.
Name:
Anonymous2008-09-30 10:09
As well as TIME people need to remember POWER. Each calculation uses some amount of power.
Assign some amount of power to each calculation, then multiply that up for the number of calculations needed to brutus, and you see that most reasonable encryption schemes need ridiculous amounts of power to brute force.
put it on the internet, and let us try to break it. It'll be faster that way, and when someone gets a password, you'll hear about it
Name:
Anonymous2009-03-30 15:58
>>29
i knew some one was going to say that but i'm 21 >>30
it's a 20 gig volume so that's not going to happen
Name:
Anonymous2009-04-01 20:15
some friend of mine in the same position made a cluster of about 150 computers solved it in 2 hours and only took 4 hours of prep. :D but he's Bulgarian....
dude, reverse the encryption system, a few megabytes of encryption can be un-hashed until you get the key, much better than 20 million years of brute force.