0% found this document useful (0 votes)
34 views

Attacks On Passwords

Social engineering techniques like phishing, shoulder surfing, and dumpster diving can allow an attacker to gain access to a computer and reset passwords. Password cracking can be done either online by continuously guessing passwords, or offline by stealing an encrypted password file and using techniques like brute force, dictionary attacks, and rainbow tables to crack passwords. The most common method of password attacks today involves attackers stealing an encrypted password file and cracking passwords offline.

Uploaded by

c3074474
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Attacks On Passwords

Social engineering techniques like phishing, shoulder surfing, and dumpster diving can allow an attacker to gain access to a computer and reset passwords. Password cracking can be done either online by continuously guessing passwords, or offline by stealing an encrypted password file and using techniques like brute force, dictionary attacks, and rainbow tables to crack passwords. The most common method of password attacks today involves attackers stealing an encrypted password file and cracking passwords offline.

Uploaded by

c3074474
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Attacker gains physical

Resetting access to computer and


resets password

Not really practical -


Online guessing
will take TOO long

Phishing, shoulder
surfing, dumpster Social engineering
diving

Keylogger, protocol
analyser (e.g.,
Wireshark)
Capturing
Method used by most
Man-in-the-middle and password attacks today
replay attacks Attacks on Passwords

Compare with
Attackers steal file with
Substituting letters/ encrypted passwords
encrypted password
placing numbers within they have created
words
Offline cracking
Every possible
Spelling words combination of letters,
backwards numbers, and
Slightly alter dictionary
Hybrid attack 1. Brute force characters used to
words
create encrypted
Slightly misspelling passwords and matched
words against stolen file
Offline cracking types:

Including special Attacker creates


characters encrypted versions of
common dictionary
2. Dictionary attack
words, Compares
against stolen password
Large pre-generated file
data set of encrypted
passwords

Used for reversing


cryptographic hash
Rainbow tables functions

Used in recovering a
plaintext password up
to a certain length
consisting of a limited
set of characters

You might also like