Technology Corner: Brute Force Password Generation -- Basic Iterative and Recursive Algorithms

Most information systems are secured at minimum by some form of password protection. For various reasons a password may be unavailable, requiring some form of password recovery procedure. One such procedure is software-based automated password recovery, where a program attempts to log into a system...

Full description

Bibliographic Details
Main Authors: Nick Flor, Haile Shannon
Format: Article
Language:English
Published: Association of Digital Forensics, Security and Law 2011-09-01
Series:Journal of Digital Forensics, Security and Law
Online Access:http://ojs.jdfsl.org/index.php/jdfsl/article/view/136