BREAKIN NEWS

Top Ten Password Cracking Methods


Hi guys, In this article i will tell you how to crack a victim password through different top 10 methods. I hope you will enable to know all the method before you start to hack a password. 
Only for education purpose :D


1: Dictionary attack

"The dictonary attack uses a simple file containing words that can, surprise surprise, be found in a dictionary. In other words, if you will excuse the pun, this attack uses exactly the kind of words that many people use as their password...."

2:Brute force attack

"The brute force attack method is similar to the dictionary attack but with the added bonus, for the hacker, of being able to detect non-dictionary words by working through all possible alpha-numeric combinations from aaa1 to zzz10 known as brute force attack.."

3: Rainbow table attack

"A rainbow table is a list of pre-computed hashes - the numerical value of an encrypted password, used by most systems today and that’s the hashes of all possible password combinations for any given hashing algorithm mind. The time it takes to crack a password using a rainbow table is reduced to the time it takes to look it up in the list, Known as Rainbow table attack..."

4: Phishing

"There's an easy way to hack: ask the user for his/her password. A phishing email leads the unsuspecting reader to a faked online banking, payment or other site in order to login and put right some terrible problem with their security known as Phishing..."

5: Social Engineering

"A favorite of the social engineer is to telephone an office posing as an IT security tech guy and simply ask for the network access password. You’d be amazed how often this works, Known as Social Engineering..."

6: Malware

"A key logger or screen scraper can be installed by malware which records everything you type or takes screen shots during a login process, and then forwards a copy of this file to hacker central. It will save all the activities of your computer and save the all records, Known as Malware attack..."

7: Offline cracking

"Often the target in question has been compromised via an hack on a third party, which then provides access to the system servers and those all important user password hash files. The password cracker can then take as long as they need to try and crack the code without alerting the target system or individual user, Known as Offline cracking..."

8: Shoulder surfing

"The service personnel ‘uniform’ provides a kind of free pass to wander around unhindered, and make note of passwords being entered by genuine members of staff. It also provides an excellent opportunity to eyeball all those post-it notes stuck to the front of LCD screens with logins scribbled upon them, known as shoulder surfing..."

9: Spidering

"Savvy hackers have realized that many corporate passwords are made up of words that are connected to the business itself. Studying corporate literature, website sales material and even the websites of competitors and listed customers can provide the ammunition to build a custom word list to use in a brute force attack. this method is known as spidering..."

10: Guess

"The password crackers best friend, of course, is the predictability of the user. Unless a truly random password has been created using software dedicated to the task, a user generated ‘random’ password is unlikely to be anything of the sort. This is easy method to guess the victim password, that's why it is called on "guess""

No comments