brute-force Questions

3

Solved

I have some sample problems that I'm writing pseudo code for and I'm noticing alarming patterns between the greedy technique and exhaustive search. Job 1, Job 2, Job 3, Job 4, Job 5 Person: 1 9 2...
Cartan asked 5/7, 2015 at 20:10

2

Solved

I have found this code to solve Knapsack Problem using brute force mechanism (this is mostly for learning, so no need to point out dynamic is more efficient). I got the code to work, and understand...
Stalinist asked 16/4, 2015 at 8:26

3

Solved

Here is an algorithm in Java: public String getHash(String password, String salt) throws Exception { String input = password + salt; MessageDigest md = MessageDigest.getInstance(SHA-512); byte[...
Cankered asked 21/7, 2011 at 12:28

5

I am trying to write a script to prevent brute-force login attempts in a website I'm building. The logic goes something like this: User sends login information. Check if username and passwo...
Krystynakshatriya asked 13/11, 2009 at 5:37

3

Solved

I have my login page and of course I want to prevent brute force attacks and cause less delay for the users when they are logging in. Currently, you type in your username and password to log...
Wholewheat asked 3/4, 2013 at 21:56

2

Solved

I came across this: I don't understand how AES128 is stronger than AES256 in a brute force attack, or how AES256 allows for more combinations than AES128. These are my simplified premises - ass...
Torture asked 17/9, 2013 at 10:37

2

I'm looking to implement the simulated annealing algorithm in Java to find an optimal route for the Travelling Salesman Problem, so far I have implemented brute force and am looking to modify that ...

2

Solved

I am writing a program for a class to first encrypt a string with a predetermined key. That part is done. Next part is where i have a problem or not a problem per se. its a question of redundancy. ...
Calefaction asked 12/6, 2013 at 9:26

3

Solved

I have forgotten my passphrase for my gpg key on linux. Can someone please help me write a simple script to use bruteforce to crack the key? I remember some of the words which MIGHT be in the...
Pintail asked 25/12, 2010 at 18:49

2

Solved

I'm trying to do a bruteforce attack on a rar archive and I need the password-check to be as fast as possible. I call rarlab's "unrar" command line utility from my program in this way: unrar t -p[...
Harlanharland asked 20/3, 2013 at 12:14

1

I've made a typo in my password back in the days when 7-zip didn't have a 'confirm pwd' field. So now I have a pwd-protected 7-zip file. I've writen some software to generate most likely typo...
Gratian asked 17/4, 2013 at 13:17

5

Solved

I am doing a security presentation for my Computer and Information Security course in a few weeks time, and in this presentation I will be demonstrating the pros and cons of different attacks (dict...
Kickshaw asked 3/9, 2010 at 23:11

3

Solved

There are several useful answers on SO regarding prevention of brute forcing a password of a web service by applying throttling. I couldn't find any good numbers though and I have little expertise ...
Messene asked 4/3, 2010 at 3:58

1

Solved

I want to generate, in python (without a dictionary), a list of string from aaa-zzz and then output a txtfile such as this (note, the ... is short for the strings in between): aaa aab aac aad ... ...
Cyrillus asked 21/8, 2012 at 13:11

1

Solved

My site is under a brute force attack in which the attackers are attempting to gain access to user accounts. The bots do not have a user agent. I have a system in place that blocks a person from si...
Turnsole asked 28/7, 2012 at 1:38

4

Solved

I implemented a small function bruteforce, using lazy evaluation to find the first valid solution for a problem: import Data.Maybe bruteforce :: (a -> Bool) -> [a] -> Maybe a bruteforce...
Therein asked 9/7, 2012 at 8:23

2

Why do divide and conquer algorithms often run faster than brute force? For example, to find closest pair of points. I know you can show me the mathematical proof. But intuitively, why does this ha...
Lecialecithin asked 15/6, 2012 at 0:37

5

Solved

I am taking a course on Cryptography and am stuck on an assignment. The instructions are as follows: The plaintext plain6.txt has been encrypted with DES to encrypt6.dat using a 64-bit key given...
Espouse asked 2/2, 2012 at 19:57

1

I'm working on authentication and adding brute-force protection. I'm not sure how I should proceed. Should I just do a flat block after 15 failed attempts for a certain IP address... or should I ...
Okay asked 18/11, 2011 at 18:57

8

Solved

I have set up my db to log every failed login attempt. I thought I would multiply the number of failed attempts with 0.05 seconds or something. Something like: time_nanosleep(0, (50000000 * $fail...
Bullyrag asked 27/1, 2011 at 17:5

8

Solved

I've seen web apps with limitations for user login attempts. Is it a security necessity and, if so, why? For example: you had three failed login attempts, let's try again in 10 minutes!! ...
Sedate asked 25/3, 2009 at 0:7

2

How feasible is it to brute force sessions? I'm currently using CodeIgniter database sessions, which does not utilize native PHP sessions - session cookie encryption and user agent matching is tur...

2

Solved

My web applications security is handled by Spring Security 3.02 but I can't find any out of the box support for Brute Force Detection. I would like to implement some application level BFD protecti...
Bedspring asked 21/4, 2010 at 8:42

14

Solved

I'm a beginner C++ programmer, and to stretch my mind I've been trying some of the problems on projecteuler.net. Despite an interest in maths at school, I've found myself automatically going ...
Heartfelt asked 6/1, 2009 at 22:37

3

How do brute-force attacks on encrypted data know when they've found the right key to decrypt the data? Is there a way to know that data's been decrypted, other than having a human looking at...
Floreated asked 16/6, 2010 at 18:21

© 2022 - 2024 — McMap. All rights reserved.