tactics:brute-force
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
tactics:brute-force [2024/10/03 07:41] – [Brute Force Attacks] Humphrey Boa-Gart | tactics:brute-force [2024/10/07 11:10] (current) – [Prevention] Humphrey Boa-Gart | ||
---|---|---|---|
Line 3: | Line 3: | ||
**Brute forcing** is a method of cracking passwords. It involves guessing the password, over and over again, until the correct one is discovered. Depending on the length & complexity of the password, and the power of the computer involved, this can take no time at all, or it can take forever. | **Brute forcing** is a method of cracking passwords. It involves guessing the password, over and over again, until the correct one is discovered. Depending on the length & complexity of the password, and the power of the computer involved, this can take no time at all, or it can take forever. | ||
- | There are two forms of brute force attacks: The first is dictionary style, | + | This can be done manually, but it takes forever. Software tools can automate this process. Some software does **dictionary-style attacks**, where it references |
Brute force attacks can be done both **locally** and **remotely**. Local attacks are for times like, when you have physical access to someone' | Brute force attacks can be done both **locally** and **remotely**. Local attacks are for times like, when you have physical access to someone' | ||
Line 10: | Line 10: | ||
===== Prevention ===== | ===== Prevention ===== | ||
- | [{{ : | + | [{{ : |
- | The most obvious recommendation | + | The most obvious recommendation to prevent brute force attacks is with decent passwords. The longer the password, the better. Don't leave default passwords set, either. Most routers are easily brute forced because they use factory passwords like " |
- | Further roadblocks | + | Further roadblocks |
- | If you run services like [[tools: | + | If you run services like [[tools: |
- | However, these methods are not universally effective in all situations. If someone manages to steal your computer or image the data off your hard drive, they can crack the password leisurely from the privacy of their home without the risk of setting off firewalls. To impede those types of attacks, it helps to have [[gear: | + | However, these methods are not universally effective in all situations. If someone manages to steal your computer or image the data off your hard drive, they can crack the password leisurely from the privacy of their home without the risk of setting off firewalls. To impede those types of attacks, it helps to have [[gear: |
===== Software ===== | ===== Software ===== | ||
+ | |||
+ | [{{ : | ||
Simple brute force attacks can be done manually. However, it is very slow to do it that way, so hackers have created a litany of tools that will perform this type of attack automatically. Here are a few of them: | Simple brute force attacks can be done manually. However, it is very slow to do it that way, so hackers have created a litany of tools that will perform this type of attack automatically. Here are a few of them: |
tactics/brute-force.1727941293.txt.gz · Last modified: 2024/10/03 07:41 by Humphrey Boa-Gart
Find this page online at: https://bestpoint.institute/tactics/brute-force
Find this page online at: https://bestpoint.institute/tactics/brute-force