17
endor
6y

FUCK YEAH!
I just managed to bruteforce my GPG key's password :D :D
I fucking love Python!

Comments
  • 8
    I'm not sure if you should be so enthusiastic about being able to do that. It has up and downsides
  • 2
    @nicogramm lol, you're right.

    To be fair though, I use(d) a fairly strong base password with an extra addition appended, but I couldn't remember what I had chosen for this key (hence the need to bruteforce by going through all possible combinations).

    Now moving to a strong, random, 64 char passwords generated with Keypass2, so no more stupid problems like this in the future
  • 7
    That's... Slightly concerning?!
  • 2
    Yes man, yes 💪 [grunt]
  • 2
    What's your base password? 😏
  • 1
    @c3ypt1c it's "me+you+[you fill the gap]" 😏
  • 1
    @endor rawwrr 😏😏
  • 1
    Erm...couldn't you have used hashcat with CUDA? I think that'd be a million times faster.
  • 1
    @PrivateGER not worth it, since I only had ~50 combinations to look through (known base bassword + some suffix that I couldn't remember).

    Plus, I needed a way to pipe each one into gpg to see if it unlocked the key anyway, so it was just easier that way
Add Comment