A way of searching for an encryption key or a password by working through a list of likely candidates. Less resource-intensive and usually faster than a brute force attack, but also less thorough.
A way of searching for an encryption key or a password by working through a list of likely candidates. Less resource-intensive and usually faster than a brute force attack, but also less thorough.