Understanding Brute Force Attacks: Cracking the Digital Lock