Answer the question
In order to leave comments, you need to log in
How many passwords + rainbow-tables can there be?
For example, I have already intercepted handshakes with the aircrack-ng utility (or rather airodump-ng).
I have a .cap file. I wondered how many password options there could be, but because I don’t know combinatorics well, I would like to make sure that I think correctly.
32 *2 (Cyrillic = lower and upper case) + 26*2 (Latin = lower and upper case) +
. , ! @ # $ % ^ & * ( ) _ - + = / " ' № : ? < > { } [ ]
28 (didn't forget anything?) + 10 (digits) = 154 c = sum([154**i for i in range(8,17)])
print(c)
sec = c/50000.0
Answer the question
In order to leave comments, you need to log in
I did not check the received numbers, but the message is correct.
Here you have answered your own question. :)
Brute force is a very reliable attack (it always works sooner or later), but an extremely inefficient attack. :)
1. What is a rainbow table? Once computed, it is reused by others for the "reverse hash" task.
2. Wi-Fi uses two parameters: ANonce and a password - so we have a challenge-response protocol designed specifically to make rainbow tables impractical - a hacking problem solved for one session will not help to hack another.
3. So how much to break? If you are trying to hack into someone else's network and put reasonable limits on someone else's password, you are. If you are setting up a security policy, it is better to take into account only the shortest of the options: if the limit is 8 ... 24 characters, then take exactly 8 for calculations.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question