related post for [some] vulnerability analysis. Peer review is welcome and needed.See
This is a variation on Oplop, covering the following implementations:
- CLI (Python)
- Android (PY4A)
It doesn't cover any other implementations of oplop, doesn't have tests or setup.py, etc. Just the minimum necessary in order to scratch a specific itch.
Oplop generates 8-character long passwords. The range is small enough to enable various brute-force attacks (e.g. rainbow tables).
Difference from oplop
Loplop is not backward compatible with oplop (but it can be told to work in "legacy mode"):
- By default, loplop generates 16-character long passwords.
- You can prefix the label with
nis an integer) in order to change the length (e.g.
- For backward compatible 8 character passwords, you can omit the
8) and write - for example -
- Maximum password length is 22 (the effective length of a 16-byte md5 hash encoded as base64). You can specify a larger
666*skidoowould be equivalent to
- If you need to use an ambiguous label (e.g.
3*cheers), you'll need to explicitly prefix it with
Misc additions to the CLI implementation:
-pcommand line argument pauses and waits for a carriage-return after execution. Used by
glop(i.e. "gnome loplop") opens a gnome-terminal running
loplop -p(plus any other args you throw at it). The password stays in the clipboad until you hit enter (which closes the window and clears the clipboard). If you don't hit enter, the window will be closed next time you run
glop(so that you don't end up with many "orphan"
glopwindows to close).
CLI on Linux: just symlink
loplop to a folder in your path (e.g.
CLI on other platforms: you tell me :)
SL4A on Android: See the README.
index.html in a browser ( preferably on a computer disconnected from the internet ;) ).
Original Oplop docs
Project home page: http://code.google.com/p/oplop/
What Oplop is: http://code.google.com/p/oplop/wiki/HowItWorks