tactics:brute-force
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
tactics:brute-force [2024/06/06 08:42] – Humphrey Boa-Gart | tactics:brute-force [2024/10/07 11:10] (current) – [Prevention] Humphrey Boa-Gart | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | {{wst> | ||
- | |||
====== Brute Force Attacks ====== | ====== Brute Force Attacks ====== | ||
- | Brute Forcing | + | **Brute forcing** |
+ | |||
+ | This can be done manually, but it takes forever. Software tools can automate this process. Some software does **dictionary-style attacks**, where it references a wordlist //(or " | ||
+ | |||
+ | Brute force attacks can be done both **locally** and **remotely**. Local attacks are for times like, when you have physical access to someone' | ||
+ | |||
+ | |||
+ | ===== Prevention ===== | ||
+ | |||
+ | [{{ : | ||
+ | |||
+ | The most obvious recommendation to prevent brute force attacks is with decent passwords. The longer the password, the better. Don't leave default passwords set, either. Most routers are easily brute forced because they use factory passwords like " | ||
+ | |||
+ | Further roadblocks depend on the type of thing that is password protected. If you have a system that is accessed remotely over the internet, you want to make sure you have brute force detection software running, which automatically sets firewall rules to lock out intruders. There are many packages that do this on the server level, and you will have to search for one that matches your particular operating system. Content management systems like Wordpress have firewall plugins that detect brute force attacks as well. | ||
+ | |||
+ | If you run services like [[tools: | ||
+ | |||
+ | However, these methods are not universally effective in all situations. If someone manages to steal your computer or image the data off your hard drive, they can crack the password leisurely from the privacy of their home without the risk of setting off firewalls. To impede those types of attacks, it helps to have [[gear: | ||
+ | |||
+ | |||
+ | ===== Software ===== | ||
+ | |||
+ | [{{ : | ||
+ | |||
+ | Simple brute force attacks can be done manually. However, it is very slow to do it that way, so hackers have created a litany of tools that will perform this type of attack automatically. Here are a few of them: | ||
+ | |||
+ | * [[arms: | ||
+ | * [[arms: | ||
+ | * [[arms: | ||
+ | * [[arms: | ||
+ | * [[arms: | ||
+ | * [[arms: | ||
+ | |||
+ | There are also various software packages for generating wordlists: | ||
+ | |||
+ | * [[arms: | ||
+ | * [[arms: | ||
===== Wordlists/ | ===== Wordlists/ | ||
- | A file that contains a large number of words. Used for brute forcing passwords. Normally in a .txt format or some other easily readable and editable format. | + | A file that contains a large number of words, used for dictionary style attacks. Normally in a .txt format or some other easily readable and editable format. |
+ | |||
+ | **Note:** These links are from the old [[anonymous: | ||
* [[ftp:// | * [[ftp:// | ||
Line 14: | Line 51: | ||
* [[http:// | * [[http:// | ||
- | ===== Programs ===== | ||
- | * [[http:// | + | ===== Rainbow Tables ===== |
- | * [[http:// | + | |
- | * [[http:// | + | On most modern systems, passwords are stored as hashed values. These hashes are generated with one-way encryption techniques. When you try to log in to one of these types of systems, the password you enter is hashed by one of these one-way algorithms, and compared to the hashed value that is saved. |
- | * [[http:// | + | |
- | * [[http:// | + | |
- | ===== Proxy Lists ===== | + | A similar method to dictionary attacks involve the use of **rainbow tables**, which are basically dictionaries but of precomputed hash values and whatever password was used to create those hashes. Rather than brute forcing the login screen directly, one might simply make a copy of the hashed passwords on the target machine, and compare those hash values to the hashes in a rainbow table in order to find the password used to log in. |
- | [[arms:proxies|Proxies]] page has a looong list. Then check them with this. Charon | + | One popular piece of software for rainbow-based cracking is [[arms:rainbowcrack|RainbowCrack]]. |
- | Why do I need a proxy? To disguise where you come from. | + | The best defense against here is using large and unique [[security: |
{{tag> | {{tag> |
tactics/brute-force.1717663349.txt.gz · Last modified: 2024/08/06 05:52 (external edit)
Find this page online at: https://bestpoint.institute/tactics/brute-force
Find this page online at: https://bestpoint.institute/tactics/brute-force