We use cookies to ensure you have the best browsing experience on our website. Please read our cookie policy for more information about how we use cookies.
- Prepare
- Algorithms
- Recursion
- Password Cracker
- Discussions
Password Cracker
Password Cracker
Sort by
recency
|
143 Discussions
|
Please Login in order to post a comment
That’s an interesting challenge! It looks like a fun way to test string manipulation. Speaking of breaking things down, it kind of reminds me of how we analyze content on social media. You can think of posts like "passwords" and your feed as an attempt to "crack" or curate based on what you follow or engage with. It’s a mix of fitting the right pieces together to get the perfect result, just like figuring out the correct password combinations!
I believe the main issue here is when we have passwords like this: [...,'aaaa' , 'aaaaaa',...]
and loginAttempt like this: ...aaaaaaaaaa...
We can find 'aaaa' + 'aaaa' but will remain 'aa' giving us a 'WRONG PASSWORD'. But, if we take 'aaaaaa' and then 'aaaa' we're gonna find a good answer.
return 'WRONG PASSWORD' if match == login: return res + match return passwordCracker, (passwords, login(minara.18_, res + match + ' ')
there are so many test cases and it seems working but most of them are failing because of time limit.
`python
for x in passwords: if x == loginAttempt[:len(x)]: # print(x) if x == loginAttempt: return x res = passwordCracker(passwords, loginAttempt[len(x):]) if res != 0 and 'WRONG PASSWORD' not in res: return x +' '+ res else: continue return 'WRONG PASSWORD'`
`if match is None: return 'WRONG PASSWORD' if match == login:hak_goswami return res + match
Does not use up stack space since we use a trampoline
return , (passwords, login[len(match):], res + match + ' ')