All tools that bruteforce passwords attempt each password only once, and if it doesn’t work, discard it. Nobody really runs 2 identical attacks back to back (they’re incredibly slow when done over the internet), so the password would seem uncrackable at first glance.
This approach wouldn’t work with hash cracking, vault breaking or file encryption, because once they get their hands on the hash/vault/file, the attacker can use their own code for hashing/checking a password candidate.
All tools that bruteforce passwords attempt each password only once, and if it doesn’t work, discard it. Nobody really runs 2 identical attacks back to back (they’re incredibly slow when done over the internet), so the password would seem uncrackable at first glance.
This approach wouldn’t work with hash cracking, vault breaking or file encryption, because once they get their hands on the hash/vault/file, the attacker can use their own code for hashing/checking a password candidate.