On September 20, 2015 9:38:01 PM EDT, James Knott
On 09/20/2015 05:30 PM, Anton Aylward wrote:
Of course WPA2 uses AES for the
encryption, so if you can't crack the password, it will still take 139 trillion years to break the encryption. Are you actually "breaking" the encryption algorithmically or are you generating the set of all possible combinations and trying them one by one?
Brute force, trying all combinations. I'll let you know when I'm done. ;-)
That's why uniqueness in passwords is important. The bad guys have been stealing credentials by the millions for a decade plus. With some of the lesser protected encryption scheme a rainbow attack allowed them to decrypt every password. Then they use the list of actual passwords as a big dictionary for future attacks. I understand the dictionary of actual passwords known to have been used by someone is now huge. The first thing a real hacker would do is run through that list first. Even 100 million could probably be checked in less than a day. So one key to good password is to pick one no one else has ever used and had stolen. Greg -- Sent from my Android device with K-9 Mail. Please excuse my brevity. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org