- · Don’t note down the passwords anywhere, just memorize them.
- · Set strong passwords that are difficult to crack.
- · Use a combination of alphabets, digits, symbols, and capital and small letters.
- · Don’t set passwords that are similar to their usernames.
Enjoy a fast, responsive and cost effective Remote IT Support service to solve your IT issues quickly and with the minimum of fuss.Focused on building innovative solutions that create value for businesses and consumers. Our solutions are built around the following three founding principles - Unique Technology; Distinctive Information / Content; and Innovative Services. Our solutions combine these three, leverage our global services delivery capabilities and ensure that we are able to provide unmatched, superior resolution to specific customer problems.
Monday, 18 September 2017
Ethical Hacking – Password Hacking
We have passwords for emails, databases,
computer systems, servers, bank accounts, and virtually everything that we want
to protect. Passwords are in general the keys to get access into a system or an
account.
In
general, people tend to set passwords that are easy to remember, such as their
date of birth, names of family members, mobile numbers, etc. This is what makes
the passwords weak and prone to easy hacking.
One should always take care to have a
strong password to defend their accounts from potential hackers. A strong
password has the following attributes:
·
1. Contains at least 8 characters
·
2. A mix of letters, numbers, and special characters
·
3. A combination of small and capital letters.
Dictionary
Attack
In a dictionary attack, the hacker uses a
predefined list of words from a dictionary to try and guess the password. If
the set password is weak, then a dictionary attack can decode it quite fast. Hydra is a popular tool that is
widely used for dictionary attacks. Take a look at the following screenshot and
observe how we have used Hydra to find out the password of an FTP service.
Hybrid
Dictionary Attack
Hybrid dictionary attack uses a set of
dictionary words combined with extensions. For example, we have the word “admin”
and combine it with number extensions such as“admin123”, “admin147”, etc. Crunch
is a wordlist generator where you can specify a standard character set or a character set. Crunch can generate all
possible combinations and permutations. This tool comes bundled with the Kali
distribution of Linux.
Brute-Force
Attack
In a brute-force attack, the hacker uses
all possible combinations of letters, numbers, special characters, and small
and capital letters to break the password. This type of attack has a high
probability of success, but it requires an enormous amount of time to process all
the combinations. A brute-force attack is slow and the hacker might require a
system with high processing power to perform all those permutations and
combinations faster. John the Ripper or Johnny is one of the powerful tools to
set a brute-force attack and it comes bundled with the Kali distribution of
Linux.
Rainbow
Tables
A rainbow table contains a set of
predefined passwords that are hashed. It is a lookup table used especially in
recovering plain passwords from a cipher text. During the process of password
recovery, it just looks at the pre-calculated hash table to crack the password.
The tables can be downloaded from http://project-rainbowcrack.com/table.htm
RainbowCrack 1.6.1 is the tool to use the
rainbow tables. It is available again in Kali distribution.
Quick Tips
Popular Posts
-
A printed circuit board (PCB) mechanically supports and electrically connects electronic components using conductive tracks, pads and other ...
-
Unable to Change IE/Windows Proxy Settings ! proxy server settings won't change ! Actually What is a Proxy Server: A proxy se...
-
0x00000709 How to Fix “Operation could not be completed error” Error When Using Shared Printer? Windows 11 22h2 1. Via Group Policy Press ...
-
Product Name Product Key Alias Consulting - Entertainment 2011 738C1 Architecture Multi-flex 2011 286C1 Aut...
-
Java applications blocked by your security settings with the latest Java CAUSE Java has further enhanced security to make the user system le...
-
Password protection may control most of the user actions affecting the Anti-Virus: settings editing, disabling, uninstalling. What will Happ...
-
Automate Active Directory PowerShell scripts "To use the Microsoft cmdlets, you must have a Windows Server 2008 R2 domain cont...
-
നിങ്ങൾ ഉപയോഗിക്കുന്ന ബ്രൌസർ സുരക്ഷിതമാണോ? നിങ്ങളുടെ ഡാറ്റാ, കച്ചവടം ചെയ്യപ്പെടുന്നുണ്ടോ? നിങ്ങൾ ഒരു ബ്രൌസർ (ഗൂഗിൾ chrome, Inbui...
-
We have passwords for emails, databases, computer systems, servers, bank accounts, and virtually everything that we want to protect. Passwo...
-
The RAID concept is simple: use multiple disks to provide disks hardware redundancy, thus greatly reducing the risk of data loss due to a di...
0x00000709 How to Fix “Operation could not be completed error” Error When Installing Shared Printer? Windows 11 22h2
0x00000709 How to Fix “Operation could not be completed error” Error When Using Shared Printer? Windows 11 22h2 1. Via Group Policy Press ...
No comments:
Post a Comment
Note: only a member of this blog may post a comment.