brute-force

Is there a bruteforce-proof hashing algorithm?

假如想象 提交于 2019-12-03 21:59:32
Well, from the discussion of hashing methods weaknesses, I've got that the only ol' good brute-force is efficient to break. So, the question is: Is there a hashing algorithm which is more rigid against brute-force than others? In case of hashing passwords. The only protection against brute force is the fact that it takes an inordinately long time to perform a brute force. Brute force works by simply going through every possible input string and trying it, one at a time. There's no way to protect against simply trying every possible combination. All cryptographic systems are vulnerable to brute

Finding pixels that make an image unique within a list, can you improve on brute force?

纵饮孤独 提交于 2019-12-03 13:23:30
问题 Suppose I have a list of strings where each string is exactly 4 characters long and unique within the list. For each of these strings I want to identify the position of the characters within the string that make the string unique. So for a list of three strings abcd abcc bbcb For the first string I want to identify the character in 4th position d since d does not appear in the 4th position in any other string. For the second string I want to identify the character in 4th position c . For the

Brute forcing DES with a weak key

折月煮酒 提交于 2019-12-03 12:16:40
I am taking a course on Cryptography and am stuck on an assignment. The instructions are as follows: The plaintext plain6.txt has been encrypted with DES to encrypt6.dat using a 64-bit key given as a string of 8 characters (64 bits of which every 8th bit is ignored), all characters being letters (lower-case or upper-case) and digits (0 to 9). To complete the assignment, send me the encryption key before February 12, 23.59. Note: I expect to get an 8-byte (64-bits) key. Each byte should coincide with the corresponding byte in my key, except for the least significant bit which is not used in DES

PHP: Anti-Flood/Spam system

佐手、 提交于 2019-12-03 09:22:29
问题 I'm actually working on a PHP project that will feature a user system (Login,Register,Send lost password to email,..) and I think that this may be very vulnerable to Brute-Force attacks and/or Spam (Send a password to someone's email like 1000 times, etc. use your fantasy) . Do today's webservers (Apache, IIS) have some sort of built-in defense against Brute-Force? What would be the best way to implement an Anti-Spam/Flood system, if I e.g.: want a page not be able to be called more than two

Bin packing bruteforce method

◇◆丶佛笑我妖孽 提交于 2019-12-03 08:43:57
I need to make program that solves bin packing problem, but I already made first fit and greedy algorithms, but my lecturer says in some cases it won't find the minimal solution to the problem. So i decided to try bruteforce, but I have no clue how it should check all possible solutions. So yea.. can someone explain to me or give pseudo-code or something. I would appreciate a lot. Dukeling Note that bin-packing is an NP-hard problem, basically meaning it will take excessively long to run brute force on it, even for relatively small input, so brute force for NP-hard problems is almost never a

Brute-force/DoS prevention in PHP

空扰寡人 提交于 2019-12-03 07:04:40
问题 I am trying to write a script to prevent brute-force login attempts in a website I'm building. The logic goes something like this: User sends login information. Check if username and password is correct If Yes, let them in. If No, record a failed attempt in the database. Check if there's too many fails within a given timeframe (eg: 5 in 5 minutes): If Yes, then pause execution for 10 seconds: sleep(10) , then report a login failure to the user. Report a login failure to the user immediately

Finding pixels that make an image unique within a list, can you improve on brute force?

邮差的信 提交于 2019-12-03 03:28:03
Suppose I have a list of strings where each string is exactly 4 characters long and unique within the list. For each of these strings I want to identify the position of the characters within the string that make the string unique. So for a list of three strings abcd abcc bbcb For the first string I want to identify the character in 4th position d since d does not appear in the 4th position in any other string. For the second string I want to identify the character in 4th position c . For the third string it I want to identify the character in 1st position b AND the character in 4th position,

PHP: Anti-Flood/Spam system

核能气质少年 提交于 2019-12-02 23:38:02
I'm actually working on a PHP project that will feature a user system (Login,Register,Send lost password to email,..) and I think that this may be very vulnerable to Brute-Force attacks and/or Spam (Send a password to someone's email like 1000 times, etc. use your fantasy) . Do today's webservers (Apache, IIS) have some sort of built-in defense against Brute-Force? What would be the best way to implement an Anti-Spam/Flood system, if I e.g.: want a page not be able to be called more than two times a minute, however another page may be called up to 100 times a minute or so. I would definitely

Throttling brute force login attacks in Django

放肆的年华 提交于 2019-12-02 22:04:47
Are there generally accepted tactics for protecting Django applications against this kind of attack? django-axes is an existing app for detecting failed login attempts. There is also a more general django-ratelimit . You can: Keep track of the failed login attempts and block the attacker after 3 attempts. If you don't want to block then you can log it and present a CAPTCHA to make it more difficult in future attempts. You can also increase the time between login attempts after eached failed attempt. For example, 10 seconds, 30 seconds, 1 minute, 5 minutes, et cetera. This will spoil the fun

Brute-force/DoS prevention in PHP

不打扰是莪最后的温柔 提交于 2019-12-02 21:38:48
I am trying to write a script to prevent brute-force login attempts in a website I'm building. The logic goes something like this: User sends login information. Check if username and password is correct If Yes, let them in. If No, record a failed attempt in the database. Check if there's too many fails within a given timeframe (eg: 5 in 5 minutes): If Yes, then pause execution for 10 seconds: sleep(10) , then report a login failure to the user. Report a login failure to the user immediately Explaining this to a co-worker, I was asked how this would help if a hacker sent, say, 1000 requests in