-
Notifications
You must be signed in to change notification settings - Fork 1
Methodology
Ridgeback666 edited this page Mar 31, 2013
·
3 revisions
To discuss the different types of Methodology. This page could be deleted and just discussed on irc.
Here's the key. This is per Rick (founder of CMIYC). It's not about brute cluster power at all. It's all about the finesse of finding the right password patterns per password groupings. For example, if one sees a 5 character combination, with a number in the third position 99% of the time...then tweak your ruleset to lazer focus in on that.
I think last year one of the teams wrote in their writeup, they had some PhD candidate student doing nothing but pattern searching...which then drives ruleset/permutation building.