Skip to main content

Top Ten Password Cracking Methods

Top Ten Password Cracking
Methods
================

1. Dictionary attack
"This uses a simple file containing
words that can, surprise surprise,
be found in a dictionary. In other
words, if you will excuse the pun,
this attack uses exactly the kind of
words that many people use as their
password..."

2. Brute force attack
"This method is similar to the
dictionary attack but with the added
bonus, for the hacker, of being able
to detect non-dictionary words by
working through all possible alpha-
numeric combinations from aaa1 to
zzz10..."

3. Rainbow table attack
"A rainbow table is a list of pre-
computed hashes - the numerical
value of an encrypted password,
used by most systems today - and
that’s the hashes of all possible
password combinations for any
given hashing algorithm mind. The
time it takes to crack a password
using a rainbow table is reduced to
the time it takes to look it up in the
list..."

4. Phishing
"There's an easy way to hack: ask
the user for his or her password. A
phishing email leads the
unsuspecting reader to a faked
online banking, payment or other
site in order to login and put right
some terrible problem with their
security..."

5. Social engineering
"A favourite of the social engineer
is to telephone an office posing as
an IT security tech guy and simply
ask for the network access
password. You’d be amazed how
often this works..."

6. Malware
"A key logger or screen scraper can
be installed by malware which
records everything you type or takes screen shots during a login process,
and then forwards a copy of this file
to hacker central..."

7. Offline cracking
"Often the target in question has
been compromised via an hack on a
third party, which then provides
access to the system servers and
those all-important user password
hash files. The password cracker can
then take as long as they need to try
and crack the code without alerting
the target system or individual
user..."

8. Shoulder surfing
"The service personnel ‘uniform’
provides a kind of free pass to
wander around unhindered, and
make note of passwords being
entered by genuine members of
staff. It also provides an excellent
opportunity to eyeball all those
post-it notes stuck to the front of
LCD screens with logins scribbled
upon them..."

9. Spidering
"Savvy hackers have realised that
many corporate passwords are
made up of words that are
connected to the business itself.
Studying corporate literature,
website sales material and even the
websites of competitors and listed
customers can provide the
ammunition to build a custom word
list to use in a brute force attack..."

10. Guess
"The password crackers best friend,
of course, is the predictability of
the user. Unless a truly random
password has been created using
software dedicated to the task, a
user generated ‘random’ password is
unlikely to be anything of the
sort..."

Comments

Popular posts from this blog

ENABLE RIGHT CLICK ON RIGHT CLICK DISABLED SITES

ENABLE RIGHT CLICK ON RIGHT CLICK DISABLED SITES ------------------------------------------- Several web sites turn off the ability of right-click on there pages. Web administrators are using this to protecting their web pages from unauthorized copying. This is very common in past, but still there are lots of sites using this to protect copying there content by others. They use simple JavaScript to disable the ability of right-clicking on there web pages. Here I’m going to show you a very simple way to turn this function ON. When ever you visiting offending website type the code in red below in the browser URL bar, with the most cases this will work perfectly and enable you to write click on any web page and do what ever you want. “ jav ascript:void- (document. oncontext men u=null ) "

How To Find The IP Address Of A Website

In many IT trickz and hack, We need to know the IP ( Internet Protocol ) address of the Website. Like if the website is blocked in the System then we can access it if we own the IP address of that website. But the Question arises that.. How to Find the IP Address of  Website ? Step 1 : Open Command Prompt. ( Go to Run and type cmd and hit Enter )

10 Free Keyloggers

10 Free Keyloggers to monitor your Local PC or Laptop! Here is an exclusive list of top 10 free local keyloggers. However If you are planning to monitor only your PC or any PC which you have control of, then you can blindly go for “Hardware Keyloggers” as they are the safest keyloggers and operate in a complete stealth. If you Still wanna Prefer Free Keyloggers then below is the list of Free keyloggers that will really help you monitor your PC. 1) REFOG Free Edition Refog Free Keylogger beats competition in two respects: it’s simple to use and it’s free. REFOG Free Keylogger can look after your children without them even noticing. Even technically minded children won’t detect the key logger when it runs in a stealth mode. The program removes all the shortcuts and can be accessed only through a hot key combination. Running unobtrusively from the moment the system boots, REFOG Free Keylogger keeps track of all typed or pasted text. [ Download Link  ] 2) Black box express Simp