brute-force Questions

9

I've just noticed an SSH bruteforce at my server, which actually should have been banned by fail2ban, but for some reason it doesn't ban it. Most people who have problems with fail2ban, seem to hav...
Sordid asked 21/12, 2013 at 14:42

3

Solved

In case of brute force attack, what is the right status code that a REST api should return for a locked user? Actually, when a user fails password three times in last 3 minutes a lock its account. ...
Dysentery asked 2/11, 2017 at 14:37

1

Solved

I am taking a class in computer security, one of our assignments is to brute force DES that has a weak key. My Code: public static void main(String[] args) throws Exception { String temp; String...
Sheetfed asked 1/5, 2021 at 18:50

5

Solved

I'm a beginner in writing code and I've started with Python because it seemed the neatest and the easiest to start with (I currently have Python 3.2). Now I've read some online books and so on abou...
Cassock asked 6/7, 2012 at 18:13

3

Are there generally accepted tactics for protecting Django applications against this kind of attack?
Colwin asked 13/7, 2012 at 19:26

5

Solved

I have a crossword puzzle and a list of words which can be used to solve it (words can be placed multiple times or not even once). There is always a solution for the given crossword and word ...
Freckly asked 17/6, 2017 at 16:40

6

Solved

I'm building a website using Node and Express JS and would like to throttle invalid login attempts. Both to prevent online cracking and to reduce unnecessary database calls. What are some ways in w...
Lemoine asked 30/10, 2013 at 18:24

14

Solved

As a response to the recent Twitter hijackings and Jeff's post on Dictionary Attacks, what is the best way to secure your website against brute force login attacks? Jeff's post suggests putting in...
Kozak asked 8/1, 2009 at 13:25

2

Solved

What is the runtime/memory complexity of the Maximum subarray problem using brute force? Can they be optimized more? Especially the memory complexity? Thanks,
Dissertation asked 13/4, 2011 at 13:7

2

Solved

I recently got a bruteforce on my website, and wanted to write it down somewhere. The bad new is that the log file itself are 1,4 GB large (4338995 Lines) and I haven't got the logrotate fully work...
Luganda asked 30/4, 2017 at 23:59

1

I am implementing google reCaptcha. In the Google documentation, they say the way to do it. The documentation suggests server side validation of captcha. I wanted to know why we need to verify it i...
Nostrum asked 19/11, 2018 at 9:44

1

Solved

I am running a web page based on Symfony 2.7. The page uses the FOSUserBundle for user management and authentication. I can observe in the log files, that the page is "attacked" quite often by bru...
Amnesia asked 12/7, 2016 at 8:31

10

Solved

At work we have two competing theories for salts. The products I work on use something like a user name or phone number to salt the hash. Essentially something that is different for each user but i...
Kinard asked 17/10, 2008 at 18:49

10

Solved

I need to generate every possible combination from a given charset to a given range. Like, charset=list(map(str,"abcdefghijklmnopqrstuvwxyz")) range=10 And the out put should be, [a,b,c,...
Cirsoid asked 31/7, 2012 at 19:9

2

Solved

Is it possible to use Laravel's Authenticating A User With Conditions to prevent brute-force attacks? This answer for PHP, suggests adding two columns to your database (TimeOfLastFailedLogin and ...
Debera asked 24/9, 2014 at 20:56

0

Got a read-only file within a zip file which are password protected and I need to extract it to the /tmp directory. I get a CRC-32 error which suggests that the file would be corrupted yet I know ...
Disputable asked 12/2, 2018 at 11:20

4

Solved

So I was trying to make a program that brute forces passwords. Firstly, I made a program for a password of length 1: password = input('What is your password?\n') chars = 'abcdefghijklmnopqrstuvw...
Coltun asked 23/12, 2017 at 13:41

4

I recently realized that I have lost the password to my keystore (or perhaps the keystore got corrupted somehow) It keeps giving me the error: Keystore tampered or password incorrect I created an...
Calfskin asked 27/5, 2011 at 8:12

3

Solved

I am trying to determine to see if all elements in a list are same. such as: (10,10,10,10,10) --> true (10,10,20,30,30) --> false I know hashset might be helpful, but i don't know how to w...
Campbellite asked 26/3, 2015 at 20:47

8

Solved

When testing small strings (e.g. isPhoneNumber or isHexadecimal) is there a performance benefit from using regular expressions, or would brute forcing them be faster? Wouldn't brute forcing them by...
Foreplay asked 23/10, 2016 at 18:26

0

I have a couchdb server open to all IP sources. Each client make a request this way : http://username:password@couchdb/database How can I prevent a brut force attack ? Is there a way to ban a so...
Joule asked 20/9, 2016 at 14:53

2

I'm given the equation like this one: n = 7 1 + 1 - 4 - 4 - 4 - 2 - 2 How can I optimally replace operators, so that the sum of the equation is equal to zero, or print  -1. I think of one algo...
Keldah asked 2/8, 2016 at 22:4

5

In a science museum in Norway I came across the following mathematical game: The goal is to place the 10 digits from 0 to 9 such that the difference between the two products is nearest to zero. ...
Nonparticipation asked 15/7, 2016 at 9:51

4

Given a sequence of N integers where 1 <= N <= 500 and the numbers are between 1 and 50. In a step any two adjacent equal numbers x x can be replaced with a single x + 1. What is the maximum ...
Girl asked 2/4, 2016 at 13:53

16

Solved

First, a little background: It is no secret that I am implementing an auth+auth system for CodeIgniter, and so far I'm winning (so to speak). But I've run into a pretty non-trivial challenge ...
Commutate asked 26/1, 2009 at 9:37

© 2022 - 2024 — McMap. All rights reserved.