Password Hacking! How to be safe?

There are almost all of the e-mail, database, computer system, server, bank account, password you want to protect. Passwords are usually the key to accessing the system or account.
In general, people tend to set passwords such as birthdays, family names, mobile phone numbers and so on easier to remember. This is weak, the password is susceptible to attack by hackers.

In order to protect your account from potential hacking you must always be aware of using strong passwords. Strong passwords have the following attributes

  • Contains at least 8 characters.

  • A mix of letters, numbers, and special characters.

  • A combination of small and capital letters.

Dictionary Attack

In dictionary attacks, hackers use the predefined list of words in the dictionary to guess passwords. If the set password is weak, the dictionary attack is deciphered quickly. Hydra is a tool that is doing it will disseminate various dictionary attacks. Please see the screenshot below and see how to find FTP service pack using Hydra.

Hybrid Dictionary Attack

Hybrid dictionary attacks use a series of dictionary words combined with extensions. For example, use the word "admin" and combine with "admin 123", "admin 147", and so on. Crunch is a word list generator that can specify a standard character set or character set. Crunch can generate all possible combinations and permutations. This tool is bundled with Linux's Kali distribution.

Brute-Force Attack

In a brute force attack, the hacker discards the password using a combination of letters, numbers, special characters, and all possible lowercase and uppercase letters. This type of attack may succeed, but it takes a lot of time to process all combinations. Strong attacks are late, hackers may need high-throughput systems to execute all of these permutations and combinations more quickly.

John Ripper or Johnny is one of the powerful tools to set up a brute force attack bundled with the Linux Kali distribution.

Rainbow Tables

The rainbow table contains a set of preset passwords. Lookup tables are particularly useful for recovering pure passwords from ciphertext. In the password recovery process, check the pre-computed hash table and decrypt the password. These forms can be downloaded from http://project-rainbowcrack.com/table.htm.

RainbowCrack 1.6.1 is a tool for using rainbow tables. It can be distributed again in Kali.

Quick Tips

  • Don’t note down the passwords anywhere, just memorize them.

  • Set strong passwords that are difficult to crack.

  • Use a combination of alphabets, digits, symbols, and capital and small letters.

  • Don’t set passwords that are similar to their usernames.
Join Us On Facebook Click here :)

Comments

Popular Posts