|
// Proof that brute force is mostly useless. Especially over the web. It can crack the word retoor in 8 seconds in best conditions.
|
|
// If it takes 8 seconds locally for such a small word like 'retoor', how long would it take for web? Exactly.
|
|
// I wouldn't worry too much about your password at all. Just don't let it be a wordbook think to be sure. Even then, wouldn't be worried much.
|
|
// Imagine that it had to generate uuid4's. ugh.
|
|
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include "rlib.h"
|
|
|
|
unsigned long gen(char *str, int position, int length, char * expect, unsigned long attempt) {
|
|
if (position == length) {
|
|
str[position] = '\0';
|
|
return attempt;
|
|
}
|
|
|
|
for (char c = 'a'; c <= 'z'; c++) {
|
|
str[position] = c;
|
|
attempt = gen(str, position + 1, length,expect, attempt + 1);
|
|
if(!strcmp(str,expect))
|
|
{
|
|
return attempt;
|
|
}
|
|
}
|
|
return attempt;
|
|
}
|
|
|
|
int main(int argc, char *argv[]) {
|
|
|
|
char *str = (char *)malloc((1337) * sizeof(char));
|
|
|
|
if (str == NULL) {
|
|
printf("Memory allocation failed!\n");
|
|
return 1;
|
|
}
|
|
|
|
char * needle = argc == 2 ? argv[1] : "retoor";
|
|
size_t length = strlen(needle);
|
|
RBENCH(1, {
|
|
unsigned long attempt = gen(str, 0, length, needle, 0);
|
|
printf("Resolved \"%s\" within %zd combinations.\n",needle, attempt);
|
|
})
|
|
|
|
free(str);
|
|
|
|
return 0;
|
|
}
|