Last active
April 28, 2025 08:43
-
-
Save githubfoam/a7ec65e7a78c9e8e3026433ccd0ba84f to your computer and use it in GitHub Desktop.
password crack cheat sheet
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#===================================================================== | |
#Gemini | |
let's calculate the estimated cracking time for an 8-character password with only lowercase alphabetical characters. | |
Number of possible characters: | |
We have lowercase alphabets (a-z), which is 26 characters. | |
Password Length: | |
The password length is 8 characters. | |
Total possible combinations: | |
Each character slot can have 26 options (lowercase letters). | |
Therefore, the total number of possible passwords is: 26 (characters) ^ 8 (length) | |
This equals 26 * 26 * 26 * 26 * 26 * 26 * 26 * 26 = 208,827,064,576 (approximately 208 billion). | |
Scenario 1: Slow Attack (100 guesses per second): | |
Cracking time = Total combinations / Guessing Speed | |
Cracking time = 208,827,064,576 guesses / 100 guesses/second | |
Cracking time = 2,088,270,645.76 seconds | |
Converting to days: Cracking time = 2,088,270,645.76 seconds / (60 seconds/minute * 60 minutes/hour * 24 hours/day) | |
Cracking time ≈ 24.17 years | |
Scenario 2: Moderate Attack (10,000 guesses per second): | |
Cracking time ≈ 241.7 days | |
Scenario 3: Fast Attack (1,000,000 guesses per second): | |
Cracking time ≈ 2.42 days | |
Remember: | |
These are estimations. Attackers can leverage powerful machines and techniques to improve their guess rate significantly. | |
Using a password with more character types (uppercase letters, numbers, symbols) and a longer length dramatically increases the cracking time. | |
Here are some additional points to consider: | |
Rainbow tables: Pre-computed tables can be used to crack passwords faster, although this approach is less common for complex passwords. | |
Hashing algorithms: Modern systems store passwords as one-way hashes, making it difficult to retrieve the original password even if cracked. | |
#===================================================================== | |
#ChatGPT | |
#===================================================================== |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment