• MyTurtleSwimsUpsideDown@fedia.io
      link
      fedilink
      arrow-up
      58
      arrow-down
      1
      ·
      11 hours ago

      It rejects the first [correct] login attempt (it’s worded poorly). It assumes that a brute force attacker will try any given password once and move on, while a human user will think they made a typo and try again. This works until the attacker realizes that it takes two attempts, in which case it merely doubles the attempts required to breach the account, and simply requiring an additional password character would be vastly more effective.

    • black0ut@pawb.social
      link
      fedilink
      arrow-up
      18
      ·
      11 hours ago

      All tools that bruteforce passwords attempt each password only once, and if it doesn’t work, discard it. Nobody really runs 2 identical attacks back to back (they’re incredibly slow when done over the internet), so the password would seem uncrackable at first glance.

      This approach wouldn’t work with hash cracking, vault breaking or file encryption, because once they get their hands on the hash/vault/file, the attacker can use their own code for hashing/checking a password candidate.

      • MonkeMischief@lemmy.today
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        5 hours ago

        Don’t worry, a not-insignificant number of users probably use “Forgot Password?” every time because they can’t keep track of the correct one. Lol

        I suspect this is why we started to see all those “use a temporary password instead” options lately. XD