|
|
|
![]() |
|
|||||||
|
||||||||
| View Poll Results: Would your team participate in the group encryption cracking? | |||
| Yes, but we would not share the key if we got it |
|
4 | 2.12% |
| Yes, and we would share the key if we got it |
|
7 | 3.70% |
| No |
|
178 | 94.18% |
| Voters: 189. You may not vote on this poll | |||
|
|
Thread Tools |
Rating:
|
Display Modes |
|
#1
|
|||
|
|||
|
FIRST FRC Password Convention:
Past three years: 2014: 3Zones2Goals1Alliance! 2013: sAucersFlyRobotsClimb! 2012: !HotShots!KnowBalance! 2011: 5Time4For3Robots2To1Dance! Uses AESv2 128 bit for PDF encryption At first glance, it seems pretty secure. However there seem to be a lot of patterns as to how the passwords are chosen. Patterns: 1) always 22 characters after 2011 2) all of the words used are english and would appear in the dictionary 3) they use mixed case 4) a word is never separated by anything special, and no character substitution is used 5) only around 3 or 4 words are used 6) they always end with a "!" character 7) in all years but 2013 the first character has not been a letter Idea: Create a program that generates a wordlist based on the rules FIRST seems to follow when creating the passwords, split the wordlist up into smaller segments, and let different teams try different segments until the correct key is recovered Thoughts? |
| Thread Tools | |
| Display Modes | Rate This Thread |
|
|