BRUTE-FORCE
As its name suggests, this is ac rude method that tries all possible combinations, one after another. For example, attempting to crack a four-digit pass code, a brute-force attack would try ‘0001’, then ‘0002’and so on. A four-digit pass code has only 10,000 combinations, which doesn’t require vast computing power or much time to crack. Longer, more complex ‘alphanumeric’ passwords (comprising letters and numbers) can also be hacked in a brute-force attack, but require more powerful computers. Serious hackers have fast machines that can try billions of passwords every second.
DICTIONARY-ATTACK
Instead of trying numerous character combinations,it tries to crack passwords using a specific list of words. This could be every word in the English language, or just words that are commonly used in passwords (such as ‘hello’ or ‘password’ itself). It will factor in how special characters are commonly used to replace letters and numbers-for example,‘@’ instead of‘a’,or‘5’ instead of‘S’. By limiting itself to single words, it’s faster than brute-force,but won’t crack complex passwords that contain a string of random characters. So it would probably crack ‘helloSu5ann@’, but not‘fh3%2G92jF’.
RAIN BOW TABLES If ever there was areas on never to reuse the same password, it’s rainbow tables. These contain passwords that have been leaked online. By comparing the hashes (see left) of these passwords with the hashes in a stolen database, hackers can quickly work out your password. To protect against this, websites use a process called salting(see below).
RAIN BOW TABLES If ever there was areas on never to reuse the same password, it’s rainbow tables. These contain passwords that have been leaked online. By comparing the hashes (see left) of these passwords with the hashes in a stolen database, hackers can quickly work out your password. To protect against this, websites use a process called salting(see below).
PHISHING
Badly written emails that attempt to steal your passwords and other personal information can be comical.Expertly written ones that look authentic can be scarily effective.
KEYLOGGING
Usually installed as part of a malware attack, key loggers monitor your keystrokes, detecting your passwords as you type them online. They often target vulnerabilities in older software.
No comments:
Post a Comment