TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Prince – Modern password guessing algorithm [pdf]

58 点作者 timo_h超过 10 年前

3 条评论

PaulHoule超过 10 年前
Looks like a distant relative of the American Fuzzy Lop.<p>I remember the go-go years of the early 1990s, when shadow passwords weren&#x27;t the norm and cracking was easy.<p>Back then I&#x27;d consistently find machines in academic environments had a password same as username or an empty password. In fact, in non-technical areas, this could be the account of the &quot;person in charge&quot;. I&#x27;d see 50% as many with a password involving things seen in the &#x2F;etc&#x2F;passwd line and then maybe 10% as many of that by running a word list I got out of PHRACK.
评论 #8718511 未加载
scott_karana超过 10 年前
Looks pretty sweet. From TFA:<p><pre><code> PRINCEPROCESSOR V0.10 RELEASE Download from: https:&#x2F;&#x2F;hashcat.net&#x2F;tools&#x2F;princeprocessor&#x2F; - Linux - Windows - OSX</code></pre>
dhfromkorea超过 10 年前
Interesting. I am new to the world of password guessing. Is there any significant benefit of using this attack vector? Is use of personal data alone able to offer a remarkable advantage?
评论 #8719530 未加载