Brute Force/ Dictionary Attack

A Dictionary Attack tries to guess passwords with the help of lists. The goal is to use a list of known passwords to guess an unknown password. This method is useful whenever it can be assumed that passwords with reasonable character combinations are used.

A Brute Force Attack does not depend on a wordlist of common passwords, but it works by trying all possible character combinations for the length we specified. For example, if we specify the password's length as 4, it would test all keys from aaaa to zzzz, literally brute forcing all characters to find a working password.


Methods of Brute Force Attacks

There are many methodologies to carry a Login Brute Force attacks:

Attack

Description

Online Brute Force Attack

Attacking a live application over the network, like HTTP, HTTPs, SSH, FTP, and others

Offline Brute Force Attack

Also known as Offline Password Cracking, where you attempt to crack a hash of an encrypted password.

Reverse Brute Force Attack

Also known as username brute-forcing, where you try a single common password with a list of usernames on a certain service.

Hybrid Brute Force Attack

Attacking a user by creating a customized password wordlist, built using known intelligence about the user or the service.

Here is a small list of files that can contain hashed passwords:

Windows

Linux

unattend.xml

shadow

sysprep.inf

shadow.bak

SAM

password

Last updated