Subject: | |
From: | |
Reply To: | |
Date: | Mon, 10 Jul 2023 11:07:34 -0400 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
One can go to various websites and find out how many seconds it takes to
crack a classic 8 character MPE password.
Such websites have columns for numbers only, numbers with upper and
lower case letters, then adding weird symbols, NONE of them have a
column for an estimate for numbers and case IN-sensitive letters.
And those estimates assume immediate return and response, discounting 3
attempts plus disconnects.
Has anyone ever calculated what it takes for that same 8 character
password to be brute forced with typical HP3000 behavior?
connect
wait for prompt
3 attempts
disconnect
reconnect
wait for prompt again
3 attempts
rinse, repeat, ad infinitum?
I'm guessing some seconds or partial seconds waiting between disconnect
and re-prompting.
--
Tracy Johnson
BT
NNNN
* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *
|
|
|