Brute Force Attacks

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

BRUTE FORCE ATTACKS

BY: AKSHIT KUMAR


TYPES OF BRUTE FORCE ATTACKS
• Simple brute force attack—uses a systematic approach to ‘guess’ that doesn’t rely on outside logic.
• Hybrid brute force attacks—starts from external logic to determine which password variation may be most likely
to succeed, and then continues with the simple approach to try many possible variations.
• Dictionary attacks—guesses usernames or passwords using a dictionary of possible strings or phrases.
• Rainbow table attacks—a rainbow table is a precomputed table for reversing cryptographic hash functions. It can be
used to guess a function up to a certain length consisting of a limited set of characters.
• Reverse brute force attack—uses a common password or collection of passwords against many possible usernames.
Targets a network of users for which the attackers have previously obtained data.
• Credential stuffing—uses previously-known password-username pairs, trying them against multiple websites.
Exploits the fact that many users have the same username and password across different systems.

TYPES OF BRUTE FORCE ATTACKS


SOME POPULAR TOOLS USED FOR DOING
BRUTE FORCE ATTACKS

HYDRA

JOHN THE RIPPER

HASHCAT
SOME FAMOUS BRUTE FORCE ATTACKS
Dunkin’ Donuts (2015)  Alibaba (2016)

Coffee franchise Dunkin’ Donuts suffered a brute force The popular eCommerce platform Alibaba was a victim of a brute
force attack that compromised the accounts of around 21 million
attack that led to its users losing huge sums via the users in 2016. During the attack, which took place between October
company’s mobile app and website. Hackers used brute and November that year, the attackers gained unauthorized access to
force to gain unauthorized access into the accounts of the usernames and passwords of 99 million users.
19,715 users within five days, stealing their money. Leveraging the database at their disposal, they compromised 20.6
The company was later slammed with a lawsuit for not million user accounts.
informing its users about the compromise so they could Experts revealed that the primary cause of the attack was the
take necessary measures to protect their accounts. overlapping of passwords by users. It was discovered that the
majority of the users were using the same password for the platform
Although Dunkin' Donuts initially denied playing a part in for their other accounts. Another cause of the attack was weak
the attack, it later agreed to pay the sum of $650,000 in passwords. Some of the users had weak passwords that were easy to
settlement of the lawsuit. figure out
HOW TO PREVENT BRUTE FORCE PASSWORD HACKING
To protect your organization from brute force password hacking, enforce the use of strong passwords. Passwords should:
•Never use information that can be found online (like names of family members).
•Have as many characters as possible.
•Combine letters, numbers, and symbols.
•Be different for each user account.
•Avoid common patterns.
As an administrator, there are methods you can implement to protect users from brute force password cracking:
•Lockout policy—you can lock accounts after several failed login attempts and then unlock it as the administrator.
•Progressive delays—you can lock out accounts for a limited amount of time after failed login attempts. Each attempt
makes the delay longer.
•Captcha—tools like reCAPTCHA require users to complete simple tasks to log into a system. Users can easily
complete these tasks while brute force tools cannot.
•Requiring strong passwords—you can force users to define long and complex passwords. You should also enforce
periodical password changes.
•Two-factor authentication—you can use multiple factors to authenticate identity and grant access to accounts.
BRUTE DORCE ATTACKS USING USB
DEVICES LIKE ARDUINO NANO AND RASPBERRY PI PICO CAN
BE USED TO DO THE SAME

You might also like