Can this password type be brute forced?
#2
[0-9a-zA-Z] is 26 * 2 + 10 = 62 possibilities. Let's call it 6 bits (64 possibilities) just to round to nearest.

Assuming the password is generated randomly (and I'm pretty sure KeePassX will be OK here) that means we have 6*35 = 210 bits of keyspace.

That means 2^210 operations. I'm pretty sure anything > 2^100 is computationally infeasible.

So, no, it can't be bruteforced I don't think, doesn't really matter what the hash type is. (Some are slower than others for guessing.)

Some please check my working though...
Reply


Messages In This Thread
Can this password type be brute forced? - by cvr - 01-10-2020, 12:10 PM
RE: Can this password type be brute forced? - by blacktraffic - 01-10-2020, 12:55 PM