If you have the hash and know how it’s encrypted, you can just run millions of attempts offline. If you have to try to actually log in to a website, you could use a giant list of proxies to mask your location. 3 attempts from this proxies, 3 attempts from this proxy. It’s not nearly as fast but you can still rip through a common password list fairly quickly.
Latest Answers