1 / 26

What is Brute Force Attack? | Learn to Crack Passwords using Brute Force Attack

In this presentation on what is brute force attack is, we learn to crack passwords using brute force attack. The basics of how a brute force attack operates are explained, after which we take a step-by-step approach to how the attack is done. We read about the harmful implications of a brute force attack and also learn some ways how we can protect our credentials against such attacks. Finally, we have a demo where we use penetration testing tools like Airgeddon to hack into a wireless router using a handshake capture file.

Simplilearn
Télécharger la présentation

What is Brute Force Attack? | Learn to Crack Passwords using Brute Force Attack

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. With repeated attempts, a password or credential can be guessed and the system easily compromised even with the most private computers. Even secured systems run the risk of getting brute-forced given enough time. F 4 1 @ G ( 5 V * X % > 5 $ 7 & E 1 M ) ! 7 G [ Hacker

  2. Agenda for the Day • What Is Brute-Force Attack? • How Does Brute-Force Work? • Effects of Brute-Force Attacks • Precautions Against Brute-Force Attack • Live Demo of Brute-Force Mechanism

  3. Click here to watch the video

  4. What Is Brute-Force Attack?

  5. What Is Brute-Force Attack? • Generating multiple combinations of alphanumeric strings. • Can be used to guess passwords, keys or user credentials. • Has no length constraint or character barriers. • Different from a dictionary attack without a wordlist.

  6. How Does Brute-Force Work?

  7. How Does Brute-Force Work? 1 . Choosing a tool that can brute force through credentials and keys John the Ripper Hashcat Hydra

  8. How Does Brute-Force Work? 2. Creating password combinations related to the service being cracked. A 3 % C 3 @ 8 & M X 7 > K 4 D ( ! O T M 3 – 1 U P A S S W D * * * * * 5 $ 7 V E 1 J O H N ‘S Hydra S 2 # F 9 F

  9. How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ K 4 D ( ! O P A S S W D J O H N ‘S S 2 # F 9 F 5 $ 7 V E 1 Password : T M 3 – 1 U 8 & M X 7 >

  10. How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router K 4 D ( ! O P A S S W D J O H N ‘S S 2 # F 9 F 5 $ 7 V E 1 Password : A 3 % C 3 @ T M 3 – 1 U 8 & M X 7 >

  11. How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router K 4 D ( ! O A 3 % C 3 @ P A S S W D J O H N ‘S S 2 # F 9 F 5 $ 7 V E 1 Password : T M 3 – 1 U 8 & M X 7 >

  12. How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ P A S S W D J O H N ‘S S 2 # F 9 F 5 $ 7 V E 1 Password : K 4 D ( ! O T M 3 – 1 U 8 & M X 7 >

  13. How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ P A S S W D K 4 D ( ! O J O H N ‘S S 2 # F 9 F 5 $ 7 V E 1 Password : T M 3 – 1 U 8 & M X 7 >

  14. How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ K 4 D ( ! O J O H N ‘S S 2 # F 9 F 5 $ 7 V E 1 Password : P A S S W D T M 3 – 1 U 8 & M X 7 >

  15. How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ K 4 D ( ! O J O H N ‘S P A S S W D S 2 # F 9 F 5 $ 7 V E 1 Password : T M 3 – 1 U 8 & M X 7 >

  16. How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ K 4 D ( ! O P A S S W D S 2 # F 9 F 5 $ 7 V E 1 Password : J O H N ‘S T M 3 – 1 U 8 & M X 7 >

  17. How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ K 4 D ( ! O P A S S W D S 2 # F 9 F 5 $ 7 V E 1 Password : J O H N ‘S T M 3 – 1 U 8 & M X 7 >

  18. Which password among the ones listed below is the most resistant to Brute-Force attacks? • qwerty • Password123 • MX2%S>8@L • H3!!0@1291

  19. Effects of Brute-Force Attack

  20. Effects of Brute-Force Attack • Access to personal laptop/mobiles • Malware infusion and ransomware attacks • Theft of personal data for nefarious purposes • Distributing spam with hacked machines

  21. Precautions Against Brute-Force Attack

  22. Precautions Against Brute-Force Attack • Complex alphanumeric passwords • Using Two-Factor-Authentication (2FA) • Captcha during login action • Limited no. of login attempts

  23. Live Demo of Brute-Force Mechanism

More Related