Skip to content

[Issue]: Blanket cardinality on brute force #31

Open
@qawseuk

Description

Description

First thanks for releasing, trying to educate a business on password practices and this has been fairly reliable in helping go beyond just calculating strength on a pool ^ length basis.

My only issue, and probably one with the underlying library is the default of brute force cardinality being set to 10, when it can be up to 70/90 for completely randomly generated password depending on the special character set. So the password G$y!7u0L = GyuLSgdn = gyulsgdn, despite the pool size being 70 / 52 / 26 (actual entropy of 49.03 / 45.6 / 37.6 Vs library 26.58).

If there is anyway for some settings to toggle the brute force cardinality assumption off or even adjust the variable that would be really helpful. Possibly alongside any settings to tweak the guesses per second as 10 billion Vs 10,000 is a big jump (or aligning them to more real world scenarios like removing the 100 per hour and adding in a ~ 1 million per second for 2x GPUs).

Thanks

Steps to reproduce the issue

  1. Any brute force calculation defaults to 10 ^ length

Error messages/logs

No response

Additional context

No response

Terms

  • This issue occurs on the latest version.
  • This is not a duplicate of another issue.

Activity

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions