364,337 views
28 votes
28 votes
Marsha found her sister's diary that listed all of her passwords. However, it wasn't listed for which s the passwords were used. She tried each password listed until she was able to log into her sister's computer. What method of code-breaking did Marsha use?

User Wah
by
2.9k points

2 Answers

29 votes
29 votes

Final answer:

Marsha used a brute force attack, which entails trying each password until she found the one that works for her sister's computer.

Step-by-step explanation:

The method of code-breaking used by Marsha is commonly referred to as brute force attack. This approach involves systematically trying each password on the list until she finds the correct one that grants her access to her sister's computer. This method does not require any understanding of the encryption algorithm; it relies on sheer persistence and the hope that the number of passwords to try is not excessively large.

User Miorey
by
2.7k points
13 votes
13 votes

Answer:

Brute Force

Step-by-step explanation:

Brute Force - a method of hacking were the attacker submits many combination of attempts in hope of getting into the system eventually.

User Mark Roach
by
3.1k points