Current versions of xdm are sensitive to trivial brute force attack if it is compiled with bad options, mainly HasXdmXauth. Without this option, cookie is generated from gettimeofday(2). If you know starting time of xdm login session, computation of the cookie just takes a few seconds.
0231e769ce0cf64ff3d44ec208793b0c73a09fcdaf72f77222399557a47d9b35