Skip to main content

Top Ten Password Cracking Methods

Top Ten Password Cracking
Methods
================

1. Dictionary attack
"This uses a simple file containing
words that can, surprise surprise,
be found in a dictionary. In other
words, if you will excuse the pun,
this attack uses exactly the kind of
words that many people use as their
password..."

2. Brute force attack
"This method is similar to the
dictionary attack but with the added
bonus, for the hacker, of being able
to detect non-dictionary words by
working through all possible alpha-
numeric combinations from aaa1 to
zzz10..."

3. Rainbow table attack
"A rainbow table is a list of pre-
computed hashes - the numerical
value of an encrypted password,
used by most systems today - and
that’s the hashes of all possible
password combinations for any
given hashing algorithm mind. The
time it takes to crack a password
using a rainbow table is reduced to
the time it takes to look it up in the
list..."

4. Phishing
"There's an easy way to hack: ask
the user for his or her password. A
phishing email leads the
unsuspecting reader to a faked
online banking, payment or other
site in order to login and put right
some terrible problem with their
security..."

5. Social engineering
"A favourite of the social engineer
is to telephone an office posing as
an IT security tech guy and simply
ask for the network access
password. You’d be amazed how
often this works..."

6. Malware
"A key logger or screen scraper can
be installed by malware which
records everything you type or takes screen shots during a login process,
and then forwards a copy of this file
to hacker central..."

7. Offline cracking
"Often the target in question has
been compromised via an hack on a
third party, which then provides
access to the system servers and
those all-important user password
hash files. The password cracker can
then take as long as they need to try
and crack the code without alerting
the target system or individual
user..."

8. Shoulder surfing
"The service personnel ‘uniform’
provides a kind of free pass to
wander around unhindered, and
make note of passwords being
entered by genuine members of
staff. It also provides an excellent
opportunity to eyeball all those
post-it notes stuck to the front of
LCD screens with logins scribbled
upon them..."

9. Spidering
"Savvy hackers have realised that
many corporate passwords are
made up of words that are
connected to the business itself.
Studying corporate literature,
website sales material and even the
websites of competitors and listed
customers can provide the
ammunition to build a custom word
list to use in a brute force attack..."

10. Guess
"The password crackers best friend,
of course, is the predictability of
the user. Unless a truly random
password has been created using
software dedicated to the task, a
user generated ‘random’ password is
unlikely to be anything of the
sort..."

Comments

Popular posts from this blog

How To Find The IP Address Of A Website

In many IT trickz and hack, We need to know the IP ( Internet Protocol ) address of the Website. Like if the website is blocked in the System then we can access it if we own the IP address of that website. But the Question arises that.. How to Find the IP Address of  Website ? Step 1 : Open Command Prompt. ( Go to Run and type cmd and hit Enter )

HOW TO HACK REMOTE COMPUTER USING IP ADDRESS?

HOW TO HACK REMOTE COMPUTER USING IP ADDRESS? Note: we are not responsible what you are going to do with this trick FIRSTLY WE WILL TELL YOU WHAT IS INTERNET PROTOCOL (IP) The Internet Protocol is the principal communications protocol used for relaying datagram (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. IP is the primary protocol in the Internet layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their addresses. For this Purpose, IP defines addressing methods and structures for datagram encapsulation Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house...

How To Skip Ads In adf.ly On Opera Mini ( Mobile )

More then 60% user on internet use the internet through there mobile. And many time when we want to download something, we have to skip the adf.ly's ads. But the ads won't load in opera mini. So there is an easy trick to skip adf.ly's ads in opera mini. Step 1 : Open the page. Step 2 : Enter the java script in address bar. And hit enter/go. javascript:refresh   Step 3 : Click on Skip Ad . And the desired page will open.   Step 4 : Access your desired Webpage :)    CLICK HERE to try the Trick.