Brute Force/ Dictionary Attack
A Dictionary Attack
tries to guess passwords with the help of lists. The goal is to use a list of known passwords to guess an unknown password. This method is useful whenever it can be assumed that passwords with reasonable character combinations are used.
A Brute Force Attack
does not depend on a wordlist of common passwords, but it works by trying all possible character combinations for the length we specified. For example, if we specify the password's length as 4
, it would test all keys from aaaa
to zzzz
, literally brute forcing
all characters to find a working password.
Methods of Brute Force Attacks
There are many methodologies to carry a Login Brute Force attacks:
Attack
Description
Online Brute Force Attack
Attacking a live application over the network, like HTTP, HTTPs, SSH, FTP, and others
Offline Brute Force Attack
Also known as Offline Password Cracking, where you attempt to crack a hash of an encrypted password.
Reverse Brute Force Attack
Also known as username brute-forcing, where you try a single common password with a list of usernames on a certain service.
Hybrid Brute Force Attack
Attacking a user by creating a customized password wordlist, built using known intelligence about the user or the service.
Here is a small list of files that can contain hashed passwords:
Windows
Linux
unattend.xml
shadow
sysprep.inf
shadow.bak
SAM
password
Last updated