• How long does it take to hack your password?
    49 replies, posted
0.004 seconds [editline]23rd January 2012[/editline] damn
[QUOTE=Uncle Bourbon;34355767]i don't feel like entering a password on a site i know nothing about[/QUOTE] It doesn't save the password. Even if it did, it would have to know your username and what site you're using that password on the be able to do anything with it. It just takes the length and variety and figures up how long it would take to calculate the correct one.
5 minutes apparently
4 days fuck
3 hours, but if I add two asterisks to the end of it, it becomes 15 years...
Okay, I copied various Unicode tables from Wikipedia and managed: It would take a desktop PC About 1 quadragintillion years to hack your password. 1 quadragintillion is equal to 10^123 using the short count.
10 days :(
About 225 octillion years. Success!
11 googol years.
Instantly...fuck
About 343 quattuordecillion years
169 days
Current password: About 302 million years Old password: About 8 seconds
10 trestrigintillion years
169 days. Also, I clicked Make me a Password and it gave me "Immigrant Untrustworthiness" wtf
If bruteforcing at the speeds from the website, it would take up to a year to crack my password. Although, if someone wanted to crack my password it wouldn't take a year. There's several ways to "bruteforce" and not just the A-Z a-z 0-9. Bruteforcing using a dictionary would probably crack my password in a minute. [QUOTE=LDTInsomniac;34344436]408 thousand years. I don't think that's worked out correctly though... If it was plain bruteforce without any password hash, a 10 character password on my GPU with numbers, lowercase letters and uppercase letters would have about "839299366000000000" possibilies. With my GPU bruteforcing at "822000000" possibilities per second, it would take "1021045460" seconds. It would take about 32-40 days. But that's only if it is bruteforcing plain text. If it was bruteforcing an MD5 hash, it would be a 32 characters hash involving lowercase letters and numbers. So it would be longer, but not as long as 408 thousand years...[/QUOTE] Bruteforcing is not affected time wise if it's a MD5 hash. It only has to check up with the MD5 hash to see if the password is correct, just like it has to do with a normal password. Fastest way though, is to check if the Hash is already cracked online, often is.
About 1 hour.
[B] About 50 duodecillion years[/B] For my full, no character limit password hehe, I love sentence passwords.
Sorry, you need to Log In to post a reply to this thread.