Therefore, using anything related with yourself in your passwords is not a good idea. There are tools that gets all these information as an input and make combinations by using them to narrow down the possibilities about your password. The attacker then uses this information to try to guess the password. Attackers make a deep study on search engines and social media sites about the victim and get as much information as possible like the name of your mother or father, the name of your pet, your birthdate, your birthplace, the schools you finished, or the companies you worked for. It is a technique used by people who know your identity and want to exploit your account. For protecting your account from these attacks, you need to avoid using words, common patterns, consecutive numbers, and personal information in your passwords.Īnother way that is not stated above is social media engineering. The hacker tries to guess the password by using the hash values of the passwords. Rainbow tables contain common passwords and their hash equivalents. In general, passwords are stored as hashes like MD5, SHA256 or SHA512. In rainbow table attack, the attacker has already gotten the database of the credentials stored. The difference is that in the dictionary attack, attacker uses common password list and try to login your account with these passwords programmatically. In both methods, the attacker tries to guess the password by using a dictionary of words and common password list. If diversity of the characters used in the password is high and total number of characters in the character set is big, it becomes a time and energy consuming process for the attacker and it becomes difficult to crack the password.ĭictionary attack and rainbow table attack is very close to each other. For protecting yourself for such attacks, you need to use different character types like lowercase letters, uppercase letters, numbers, and special characters. If the website that you use the password is not secure and does not have a protection for multiple login attempts, hackers may use this method. If you want to protect your account to these attacks, you need to use strong passwords.īrute force is a method that iterates over all possible passwords by using character sets and checks if they are correct. Most widely used methods are brute force, dictionary attacks and rainbow table attacks. Hackers are using different methods to crack passwords.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |