BRUTE FORCE PASSWORD CRACK
PASSWORD HACK
If I had a
dollar for every time, I tried to crack the parental lock on the TV or the
password on my parents’ laptop, I would be a millionaire.
Professionally
there are a multitude of ways to crack a password of a system. Let’s learn one
such technique of cracking the password.
PASSWORD CRACK (BRUTE FORCE)
You already
know about Kali LINUX and the tools come installed with it. It’s time for you
to know a bit about what brute force is.
No no… we
are not telling you to punch your monitor (at least not yet)
A brute
force attack refers to manually running all possible combinations on a system
in order to crack its password. Something we have all tried while trying to
remove the parental locks when we were young. One is bound to hit the bulleye….
Watch this
video to know about applying brute force attack to crack a password and using a
pre-installed tool in kali know as Crunch.
Brute
force, crunch and crawlers…. somebody wasn’t in the mood while naming these.
TYPES OF PASSWORD ATTACKS
There are
two main categories of password cracking techniques: offline and online. Online
attacks are performed on a live host or system by either brute-force or
wordlist attack against a login form, session, or other type of authentication
technique used.
Let’s take a look at some of the password cracking techniques other than Brute Force Technique
1. Dictionary Attacks: While similar to
a brute-force attack, there is one major difference between the two techniques.
In this scenario, the hacker uses a list of probable matches (based on words of
the English language, for example) instead of trying all potential characters
on by one.
2. Rainbow Table Attacks: A rainbow
table is a pre-compiled table used for recovering hashes. Each rainbow table is
for a specific length of password containing a well-defined set of characters. This
technique aims to reduce the guessing time but is limited to passwords no
longer than nine characters.
3. Markov Chains Attacks: To use the
Markov Chains technique hackers need to assemble a certain password into
2-grams and 3-grams (2- and 3-character-long syllables), develop a new alphabet
where these different elements act as letters and then match it with the
existing password database.
1. Which one of the following is a
wordlist generator?
a. Crunch
b. Brute Force attack
c. Crawlers
d. SQL injection
Ans- a. Crunch
KEY TAKEAWAYS!
Hey there I
hope you are having an excellent journey so far.
Here are a
few pointers to remember
·
Brute
force is one of the most common and one of the simplest password cracking
techniques that we can learn.
·
It
is an exhaustive search technique. This means that the computer tries every
possible combination until one of them is right
·
It
is impossible for a person to carry out physically.
0 Comments