The cost of a brute force attempt would be 32^36 (32 characters with 36 possibilities [a-z0-9] each) possibilities divided by the speed of the attackers hardware (eg. a few hundred thousand attempts per second). This would still take several thousands of years to crack (see Link List for examples)


This page provides a tool to generate Lazy Passwords.

You just have to remember two simple Values, like the server name, a username or a service name and another (more random) value like a super simple password (eg. ae0ea) that would act as some sort of seed for this function. This seed would prohibit the generation of the same hash twice, as it should be unique for every user/login/ect.

These two Values will get combined (just placed behind each other and separated via a '#' sign), hashed via an MD5 function, and printed back out. So you will get a secure 32 Character long Password, which can be easily recreated and remembered.

Pseudo Code: md5($PART1#$PART2)

DIY (local)

You could also use the following bash script to generate the passwords local on your machine.

Just be aware NOT have a newline at the end of the string. Otherwise the generated Hash will be wrong/different.

Bash version