HP3000-L Archives

July 2023, Week 2

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Tracy Johnson <[log in to unmask]>
Reply To:
Tracy Johnson <[log in to unmask]>
Date:
Mon, 10 Jul 2023 11:07:34 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (39 lines)
One can go to various websites and find out how many seconds it takes to 
crack a classic 8 character MPE password.

Such websites have columns for numbers only, numbers with upper and 
lower case letters, then adding weird symbols, NONE of them have a 
column for an estimate for numbers and case IN-sensitive letters.

And those estimates assume immediate return and response, discounting 3 
attempts plus disconnects.

Has anyone ever calculated what it takes for that same 8 character 
password to be brute forced with typical HP3000 behavior?

connect
wait for prompt
3 attempts
disconnect
reconnect
wait for prompt again
3 attempts
rinse, repeat, ad infinitum?
I'm guessing some seconds or partial seconds waiting between disconnect 
and re-prompting.

-- 
Tracy Johnson
BT







NNNN

* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *

ATOM RSS1 RSS2