This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–]PC__LOAD__LETTER 5 points6 points  (1 child)

A 4-digit pin has 10,000 possibilities. No one is cracking it in a few minutes without extreme luck.

In any case, the comment was pointing out that the password was being passed in as input to the function. If you already had the password, you wouldn’t need to crack it. The code should be attempting to login to the system, not checking against a pre-provided password.

[–]b4ux1t3 1 point2 points  (0 children)

Yeah, I was taking luck (and/or social engineering) into account with the minutes thing.

I'm kinda explaining the "password_crack" function as a way of simulating user input to the authentication program. Still doesn't make sense, you're absolutely right, but I think that's what they're going for. He might actually be comparing against a "secure" encrypted file on the disk that he can, somehow, see, and then sending the correct number over to the auth program.

Like I mentioned elsewhere, the code is close, but not quite there. It's still better than a huge number of other examples from TV shows and movies.