Different Ways Through Which Hackers Can Hack Your Password – Cyber Safety #5

Different Ways Through Which Hackers Can Hack Your Password

The following are the most common password cracking techniques in use:

Dictionary attack: In this technique, the hacker creates a file with words that are frequently used by computer users while creating passwords. The hacker uses this file and a program to compare the words In the file against the password used by the user. If a match is found, the hacker can then use the password to gain access to the system resources.

Brute force attack: This technique is similar to the Dictionary attack but with a little difference that it detects the password using the algorithm, which uses alphanumeric combinations. So, in this method, in place of dictionary words, alphanumeric combinations are used to guess the password. Although this technique is slow but it uncovers the user password eventually

Rainbow table attack: In hashed password technique, passwords are secured by inducing hashes in the original password. Using an algorithm, the Rainbow technique reduces these hashes to recover the original password string and then generate a new string that can be used to guess the user password.

Phishing: Phishing is the act of sending an e-mail or a message to a user with the intention to steal the confidential Information. In other words, In Phishing, the target is contacted by an email, telephone or text message by someone claiming as a legitimate person, or institution to lure the individual into providing sensitive data like personal information, bank details, credit card details, etc.

Spidering: Spidering uses programs, which can scan the pages of a website one by one, and in this process, it scans and extracts the useful information and stores it in the search engines database. The information in the database can then be used to extract useful information related to a company or institution, etc.

You Might Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *