tactics:brute-force
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
tactics:brute-force [2024/10/03 03:38] – [Prevention] Humphrey Boa-Gart | tactics:brute-force [2024/10/07 11:10] (current) – [Prevention] Humphrey Boa-Gart | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Brute Force Attacks ====== | ====== Brute Force Attacks ====== | ||
- | **Brute forcing** is a method of cracking passwords. It involves | + | **Brute forcing** is a method of cracking passwords. It involves |
- | There are two forms of brute force attacks: The first is dictionary style, | + | This can be done manually, but it takes forever. Software tools can automate this process. Some software does **dictionary-style attacks**, where it references |
Brute force attacks can be done both **locally** and **remotely**. Local attacks are for times like, when you have physical access to someone' | Brute force attacks can be done both **locally** and **remotely**. Local attacks are for times like, when you have physical access to someone' | ||
Line 10: | Line 10: | ||
===== Prevention ===== | ===== Prevention ===== | ||
- | {{ : | + | [{{ : |
- | The most obvious recommendation | + | The most obvious recommendation to prevent brute force attacks is with decent passwords. The longer the password, the better. Don't leave default passwords set, either. Most routers are easily brute forced because they use factory passwords like " |
- | Prevention of brute force attacks depends | + | Further roadblocks depend |
- | If you run services like [[tools: | + | If you run services like [[tools: |
- | However, these methods are not universally effective in all situations. If someone manages to steal your computer or image the data off your hard drive, they can crack the password leisurely from the privacy of their home without the risk of setting off firewalls. To impede those types of attacks, it helps to have [[gear: | + | However, these methods are not universally effective in all situations. If someone manages to steal your computer or image the data off your hard drive, they can crack the password leisurely from the privacy of their home without the risk of setting off firewalls. To impede those types of attacks, it helps to have [[gear: |
===== Software ===== | ===== Software ===== | ||
+ | |||
+ | [{{ : | ||
Simple brute force attacks can be done manually. However, it is very slow to do it that way, so hackers have created a litany of tools that will perform this type of attack automatically. Here are a few of them: | Simple brute force attacks can be done manually. However, it is very slow to do it that way, so hackers have created a litany of tools that will perform this type of attack automatically. Here are a few of them: | ||
- | **Note:** These links are from the old [[anonymous:insurgency-wiki|Insurgency Wiki]] page, and still need to be gone through and updated. | + | |
+ | | ||
+ | * [[arms: | ||
+ | * [[arms:john-the-ripper|John the Ripper]] - Linux, Windows & Mac | ||
+ | * [[arms:medusa|Medusa]] | ||
+ | * [[arms:sqldict|SQLdict]] | ||
- | * [[http:// | + | There are also various software packages for generating wordlists: |
- | * [[http:// | + | |
- | * [[http:// | + | * [[arms:cewl|CeWL]] |
- | * [[http:// | + | * [[arms:crunch|Crunch]] |
- | * [[http:// | + | |
Line 44: | Line 50: | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
+ | |||
+ | |||
+ | ===== Rainbow Tables ===== | ||
+ | |||
+ | On most modern systems, passwords are stored as hashed values. These hashes are generated with one-way encryption techniques. When you try to log in to one of these types of systems, the password you enter is hashed by one of these one-way algorithms, and compared to the hashed value that is saved. | ||
+ | |||
+ | A similar method to dictionary attacks involve the use of **rainbow tables**, which are basically dictionaries but of precomputed hash values and whatever password was used to create those hashes. Rather than brute forcing the login screen directly, one might simply make a copy of the hashed passwords on the target machine, and compare those hash values to the hashes in a rainbow table in order to find the password used to log in. | ||
+ | |||
+ | One popular piece of software for rainbow-based cracking is [[arms: | ||
+ | |||
+ | The best defense against here is using large and unique [[security: | ||
{{tag> | {{tag> |
tactics/brute-force.1727926686.txt.gz · Last modified: 2024/10/03 03:38 by Humphrey Boa-Gart
Find this page online at: https://bestpoint.institute/tactics/brute-force
Find this page online at: https://bestpoint.institute/tactics/brute-force