28 जुल॰ 2016 - You can easily relate it to repeatedly guessing your phone's unlock pattern or . While most brute forcing tools use username and password to .