Password guessing:
--> In password guessing, an attacker can either manually enter passwords or use a software to automate the process.
--> Only one attacker is performing this attack.
Brute Force Attack
--> Brute-force password attacks are performed by using software that are called "password crackers."
--> A password cracker performs a brute force crack by systematically trying every possible password until it succeeds.
--> For example, it may start by trying all one-character passwords, then move to two-character passwords, and so on, trying all possible combinations until they crack the password.
--> in this method, the speed at which an attacker can obtain a password may depend on the speed of the attacker's computer (how many calculations it can perform per second), the speed of the attacker's Internet connection, and the length and complexity of the password.
--> Many password crackers are available, and many at no cost.
--> Some common password attack tools that are openly available include Cain and Abel, John the Ripper, OphCrack, and L0phtCrack.
Dictionary attacks
--> Dictionary attacks use word lists to structure login attempts.
--> Word lists can contain millions of words, including words from natural language dictionaries and sports team names, profanity, and slang.
--> Dictionary attacks are not always successful and are often attempted before a brute-force attack.
--> In some ways, however, a dictionary attack is similar to a brute-force attack. It is an automated process that is performed by a password cracker program.
--> The speed at which the attacker can obtain a password may depend on the speed of the attacker's computer (how many calculations it can perform per second), the speed of the attacker's Internet connection, and the length and complexity of the password.
--> Many dictionary attack tools are available for free on the Internet.
--> For example, Cisco security researchers have discovered a hub of dictionary data which included 8.9 million possible username and password combinations, including strong passwords
Phishing attacks
--> Another way for attackers to find passwords is by indirectly asking the user.
--> For example, a phishing email can direct victims to visit a malicious fake website where they are asked to enter their personal information, such as their password or credit card, social security, and bank account numbers.
--> An attacker may set up a website that is of interest to the victim, and when the victim is lured to create an account on the attacker's site, the attacker captures the password knowing that many people reuse the same password, or major portions of it, for all their web accounts.
Pass-the-Hash Attacks
--> Pass-the-hash is a hacking technique that allows an attacker to authenticate to a remote server/service without using brute-force.
--> The attacker uses the hash of the user's password, instead of requiring the associated plaintext password to log in to the remote server/service.
--> Pass-the-hash attacks can be directed against Windows systems and other systems.
--> Some Windows authentication protocols, such as LM and NTLMv1, store the password hash in memory during logon authentication.
--> LM and NTLMv1 authentication protocols contain known vulnerabilities, and Microsoft has long recommended that Windows computers use only the NTLMv2 or Kerberos authentication protocols.
--> There are many tools that attackers can use to implement the pass-the-hash attack, such as Metasploit PSExec, msvctl, and Psh-toolkit.
--> In password guessing, an attacker can either manually enter passwords or use a software to automate the process.
--> Only one attacker is performing this attack.
Brute Force Attack
--> Brute-force password attacks are performed by using software that are called "password crackers."
--> A password cracker performs a brute force crack by systematically trying every possible password until it succeeds.
--> For example, it may start by trying all one-character passwords, then move to two-character passwords, and so on, trying all possible combinations until they crack the password.
--> in this method, the speed at which an attacker can obtain a password may depend on the speed of the attacker's computer (how many calculations it can perform per second), the speed of the attacker's Internet connection, and the length and complexity of the password.
--> Many password crackers are available, and many at no cost.
--> Some common password attack tools that are openly available include Cain and Abel, John the Ripper, OphCrack, and L0phtCrack.
Dictionary attacks
--> Dictionary attacks use word lists to structure login attempts.
--> Word lists can contain millions of words, including words from natural language dictionaries and sports team names, profanity, and slang.
--> Dictionary attacks are not always successful and are often attempted before a brute-force attack.
--> In some ways, however, a dictionary attack is similar to a brute-force attack. It is an automated process that is performed by a password cracker program.
--> The speed at which the attacker can obtain a password may depend on the speed of the attacker's computer (how many calculations it can perform per second), the speed of the attacker's Internet connection, and the length and complexity of the password.
--> Many dictionary attack tools are available for free on the Internet.
--> For example, Cisco security researchers have discovered a hub of dictionary data which included 8.9 million possible username and password combinations, including strong passwords
Phishing attacks
--> Another way for attackers to find passwords is by indirectly asking the user.
--> For example, a phishing email can direct victims to visit a malicious fake website where they are asked to enter their personal information, such as their password or credit card, social security, and bank account numbers.
--> An attacker may set up a website that is of interest to the victim, and when the victim is lured to create an account on the attacker's site, the attacker captures the password knowing that many people reuse the same password, or major portions of it, for all their web accounts.
Pass-the-Hash Attacks
--> Pass-the-hash is a hacking technique that allows an attacker to authenticate to a remote server/service without using brute-force.
--> The attacker uses the hash of the user's password, instead of requiring the associated plaintext password to log in to the remote server/service.
--> Pass-the-hash attacks can be directed against Windows systems and other systems.
--> Some Windows authentication protocols, such as LM and NTLMv1, store the password hash in memory during logon authentication.
--> LM and NTLMv1 authentication protocols contain known vulnerabilities, and Microsoft has long recommended that Windows computers use only the NTLMv2 or Kerberos authentication protocols.
--> There are many tools that attackers can use to implement the pass-the-hash attack, such as Metasploit PSExec, msvctl, and Psh-toolkit.
0 Comments