[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
Solved

Posted on 2008-11-04
Medium Priority
348 Views
I had to walk a user through setting up a firewall (she's remote). I gave her a temporary password to use during the setup figuring I would log in later to change it. She entered the characters in the different order and I can't for the life of me figure it out. I'd rather not hard reset the Firewall because we can't afford the downtime nor are any of the users very tech savvy. I know all of the letters and the length of the password and that's it. Is there any sort of combination application (where I can put my characters in and it will tell me all of the possibilities)?
0
Question by:HumanScaleDev
• 3

LVL 27

Expert Comment

ID: 22876132

How to make an excel macro that finds every single possible combination of letters in a string of X amount
0

LVL 27

Expert Comment

ID: 22876165
Since you know your letters you can limit the loops:

if you used 12 distinct characters:
``````Code for a-z all combinations, repeat
Sub a2zRpt()
Count = 1
For a = 1 To 12
For b = 1 To 12
For c = 1 To 12
Cells(Count, 3) = Chr(96 + a) & Chr(96 + b) & Chr(96 + c)
Count = Count + 1
Next
Next
Next
End Sub
``````
0

LVL 27

Expert Comment

ID: 22876196
This is for 3 characters.

OK let's modify it a bit - 9 characters long - 8 different chars used (one double)

``````Code for a-z all combinations, repeat
Sub a2zRpt()
Count = 1
For a = 1 To 8
For b = 1 To 8
For c = 1 To 8
For d = 1 To 8
For e = 1 To 8
For f = 1 To 8
For g = 1 To 8
For h = 1 To 8
For i = 1 To 8
Cells(Count, 9) = Chr(96 + a) & Chr(96 + b) & Chr(96 + c) & Chr(96 + d) & Chr(96 + e) & Chr(96 + f) & Chr(96 + g) & Chr(96 + h) & Chr(96 + i)
Count = Count + 1
Next
Next
Next
End Sub
``````
0

LVL 3

Accepted Solution

kg69 earned 2000 total points
ID: 22876221
0

Author Closing Comment

ID: 31513066
While the others may work, I'm no Excel guru so this was simple. Thanks!
0

## Featured Post

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
###### Suggested Courses
Course of the Month19 days, 15 hours left to enroll