Some of the most common, and most effective, methods for stealing passwords : PART 2
1. Dictionary attack :
2. Mask attack :
3. Rainbow table attack :
4. Network analysers :
1. Dictionary attack :
Dictionary attacks work because many computer users and businesses insist on using ordinary words as passwords. Dictionary attacks are rarely successful against systems that employ multiple-word phrases, and unsuccessful against systems that employ random combinations of uppercase and lowercase letters mixed up with numerals. In those systems, the brute-force method of attack (in which every possible combination of characters and spaces is tried up to a certain maximum length) can sometimes be effective, although this approach can take a long time to produce results.
2. Mask attack :
For example, if you know the last character in a password is a number, you can configure your mask to only try numbers at the end. Using traditional brute-force attacks, you would still be forced to try characters that are not numbers.
This matters because the total combination of characters to exhaust with a masking attack is smaller.
For example, if we take the following password:
Mask101
It has a length of 7 characters and for each one, it could be upper-case (26 potential characters), lower-case (26 potential characters), a symbol (33 potential characters) or a number (10 potential characters), we’d have to try a total number of 95^7 (69,833,728,698,375) combinations.
Now suppose we know the last three characters are numbers. This would drastically reduce the potential keyspace as no passwords with any letter or symbol in the last three spaces would need to be tried.
Of course you need to make sure your information on the password is correct, otherwise your mask may not generate the password. Using masking you can also create masks to exploit password habits. For example, a common habit is for passwords to start with a capital if at least one is required.
Comments
Post a Comment