Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It looks like it would be easier to bruteforce fixed RC4 key than 10000 iterations of MD5, especially due to known weaknesses of RC4 key schedule.

Name of target software in Program Files is interesting nevertheless. Probably it's mentioned in the encrypted code/data.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: