Sunday 30 October 2016

Top 10 Password Cracking Techniques Used By Hackers

#1 Dictionary Attack





Dictionary Attack


Dictionary attack is a technique used by most of the regular hackers to determine the passphrase by trying their luck many times. Unlike its name, it works like a dictionary it is just a simple file which contains some unusual words that many people use as their password it is one of the easy ways to hack into anyone’s account. But putting up a tough password can beat this attack.

#2 Brute Force Attack





Brute Force Attack


The main motto of Brute force attack is to crack passwords. It will try its level best and try every possible combination until the password is found. But nowadays, people are smarter, so the growing size of passwords is making Brute Force attack difficult to crack any password. It is much similar to Dictionary attack it is something like the upgraded version of Dictionary attack.

#3 Phishing





Phishing


Phishing is the easiest method used by hackers. It does nothing, it simply ask users for their passwords but the process of asking password is unique and different, Hackers used to create the fake page, fake emails, fake apps etc. It simply asks you to log in with your Id and password and once you have entered the details, your details are transferred into hacker’s server.

#4 Trojans, Viruses, And Other Malware





Trojans, Viruses, And Other Malware


These programs are usually developed by hackers for the sole purpose of generating the target destruction. Viruses and worms are usually added to a user’s system so that they can make the full use of a machine or a network as a whole, and are usually spread by email or either it is hidden in any applications.

#5 Shoulder Surfing





Shoulder Surfing


Shoulder surfing is the practice of spying on the user of a cash-dispensing machine or another electronic device in order to obtain their personal identification number, password, etc. It is mostly found in the eye-catching notes stuck in front of your LCD monitor which keep asking you to login into them.

#6 Port Scan Attack





Portscan


This is a technique often used to find weaknesses on a given server. It is normally used by those who are responsible for security to find vulnerabilities in the system. Port Scan Attack is used to send a message to a port and wait for a response and the received data from the open port is an invitation for hackers to hack into your server.

#7 Rainbow Table Attack





Rainbow Table Attack


Rainbow Table is usually a large dictionary which contains loads of pre-calculated hashes and the passwords from which they were calculated. The major difference between Rainbow and other dictionary attacks are Rainbow table are specially optimized for hashes and passwords.

#8 Offline Cracking





Offline Cracking


Mostly password hacking takes place offline usually data is obtained from a compromised system. A hacker can test the validity of password attempts. Offline password attacks include dictionary attacks and rainbow table attacks.

#9 Social Engineering





Social Engineering


Social engineering is an attack which relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Hackers can try different tricks to break into normal security procedures.

#10 Guessing





Guessing


Here hackers can try guessing your passwords, they can even try to guess your security answer. In short, hackers can try to guess everything to break your security and hack your account. However, thanks to two-steps and login code alert this type of techniques are usually a failure nowadays.

No comments:

Post a Comment