I spend a whole day to code the bruteforce, because the efficiency of hash chain in our project got some problem, so the hash chain would be hand on , I change my target into bruteforce attack.
There are three types of brute force attack:
Dictionary attacks
Search attacks
Rule-based search attacks
I finished most part of dictionary attacks.
The search attacks look like below, and the internal code of random text was coding by Xing Pan, if the English alphabet divide into upper case and lower case in the code, it would be better. However, the search attacks still designing...
The happy thing is that I finally know how to package and release our program. The library must be included. The hash kit could run on any Windows platform and it is easier share to my friend.