// Proof that brute force is mostly useless. Especially over the web. It can crack the word retoor in 8 seconds in best conditions. // If it takes 8 seconds locally for such a small word like 'retoor', how long would it take for web? Exactly. // I wouldn't worry too much about your password at all. Just don't let it be a wordbook think to be sure. Even then, wouldn't be worried much. // Imagine that it had to generate uuid4's. ugh. #include #include #include #include "rlib.h" unsigned long gen(char *str, int position, int length, char * expect, unsigned long attempt) { if (position == length) { str[position] = '\0'; return attempt; } for (char c = 'a'; c <= 'z'; c++) { str[position] = c; attempt = gen(str, position + 1, length,expect, attempt + 1); if(!strcmp(str,expect)) { return attempt; } } return attempt; } int main(int argc, char *argv[]) { char *str = (char *)malloc((1337) * sizeof(char)); if (str == NULL) { printf("Memory allocation failed!\n"); return 1; } char * needle = argc == 2 ? argv[1] : "retoor"; size_t length = strlen(needle); RBENCH(1, { unsigned long attempt = gen(str, 0, length, needle, 0); printf("Resolved \"%s\" within %zd combinations.\n",needle, attempt); }) free(str); return 0; }