View Single Post
  #3  
Old 11-06-2011, 03:49 AM
Tandum's Avatar
Tandum (Robin)
Registered User

Tandum is offline
 
Join Date: Apr 2008
Location: Wynnum West, Brisbane.
Posts: 4,166
Login data is run through an algorithm to produce a number or a hash, hence the hash file. All operating systems do the same thing basically. The brute force attack knows the algorithm and matches guesses to the hash file. It used to take 6 months for a cpu to crack a 7 character password. How times have changed, and so quickly.
Reply With Quote