![]() |
Password cracking techniques 2020 |
What is password?
A password is a word/string of characters used for user
authentication to provide security and which is to be kept secret from those
not allowed access.
What is password cracking?
In simple words it is stealing of password without taking
permission from the user.
Different password cracking techniques:
1.Phishing:
So, basically it is an attack of gathering sensitive
information of person or target such as username, password, email id etc.
Gathering sensitive info may also includes bank details,
credit card, debit card information and many more.
In this attack a hacker disguises himself as a trustworthy
entity then he meets you or he tricks you into your sensitive information into
that fake web application. So, this is phishing.
In another scenario,
You probably seen it you receive an email from your bank or
trusted company and it’s asking you for information and shocking is that it’s
looks real. But it’s designed to fool you into handling over important
information.
This is called phishing.
2.Social engineering:
In simple words it is the art of manipulating peoples in
attempt to obtain confidential information by tricking them into clicking a
malicious link giving the hacker access to information.
Different types of tactics that are used in the world of
social engineering:
- Phishing
- Vishing
- Pretexting
- BaitingTail
- gating
3.Rainbow table attack:
It is a precomputed table for reversing cryptographic hash
functions used for cracking password hashes such as char 256, md5 etc.
Now here’s come the new word precomputed.What does it mean?
It means this table has already had the hashing done to it.
This,
means inside the table is a password and a hash of that password
Reason why rainbow table is useful is because it will
significantly speed things up as traditional word list or brute force attack
will need to take password hash it then, compare it with it.
With a rainbow table there is no need to hash any of the
passwords as that already been done.
4.Dictionary attack:
It is a simple and a faster attack by dictionary mean any
digital resources that have a word like Wikipedia this is how it works.
Steps:
- From a dictionary, hackers generate thousands of candidate digests. They create a huge look up table with candidate digests.
- Hackers compare these candidate digests to those in a stolen digest the file. If there’s a match they get the password.
5.Brute force attack:
It is when hackers use computers to systematically cycle
through each letter in a character set.
In this attack we keep guessing passwords of others until
end but we humans cannot guess more than 100 passwords so for guessing hackers
use computer programs.
Brute force attacks try all possible combinations until end and
when password matches then it tells us what the correct password is.
6.Malware attack:
Malware comes in many forms. Ransomware locks infected
systems until the victim pays a ransom to unlock it.
Credential stealers are used to get usernames and passwords
for email and other accounts.
7.Shoulder surfing:
Shoulder surfing is when you look over people’s shoulders
figuratively and literally and look at what they’re doing.
We are looking at their data basically you’re snooping over
people’s shoulder and looking at does not to be the shoulders could be around
their shoulders.
Especially common in airports, coffee shops etc.
Ways to prevent shoulder surfers:
- Keep back to wall
- Use a filter over screen
- Close your laptop lid
- Never work on private stuff in public places
Sir nice job waiting for next one
ReplyDeleteSuperb
ReplyDeleteBhot Sahi
ReplyDelete