How hackers get hold of passwords?Rate:


Table of Contents
How hackers get hold of passwords?
Tags: Hackers, Password

There are four main techniques hackers can use to get hold of your password. In this article we will try to understand all of them.

1. By Stealing Your Passwords

This means looking over your shoulder when you type it or finding the notebook or paper where you wrote your password. This is probably the most common way passwords are compromised, thus it is very important that if you do write your password down you keep the paper extremely safe. Also, remember not to type in your password when somebody could be watching.

If your CCTV camera is not properly configured, then also hackers can crack into those cameras and if you enter your password in front of that camera then they will be able to find it out.

2. By Guessing Your Password

It's amazing how many people use a password based on information that can easily be guessed. Psychologists say that most men use 4 letter obscenities as passwords and most women use the names of their boyfriends, husbands, or children.

3. By Brute Force Attack

This is where every possible combination of letters, numbers, and symbols in an attempt to guess the password. While this is an extremely labor-intensive task, with modern fast processors and software tools this method is not to be underestimated.

A Pentium 100 PC might typically be able to try 200,000 combinations every second this would mean that a 6-character password containing just upper and lower case characters could be guessed in only 28 hours.

4. By Dictionary Attack

A more intelligent method than the brute force attack described above is the dictionary attack. This is where the combinations tried are first chosen from words available in a dictionary. Software tools are readily available that can try every word in a dictionary or word list or both until your password is found.

Dictionaries with hundreds of thousands of words, as well as specialist, technical, and foreign language dictionaries, are available, as are lists of thousands of words that are often used as passwords such as "query", "abcdef", etc.

Author: Mikhail

No comments yet.

You must be logged in to leave a comment. Login here


Thread Back to Threads Thread

You May Also Like

If you can change the future then it is actually an intuition and not the future
Tags: Physics, Time Travel, Future, Intuition

As per the general understanding, the Future is a time that is yet to come. But when we talk about time travel to future, it is generally for knowing the future in advance or simply trying to change it on our own will. But does future holds it's title of being the future if we can change it?
Why Ethical Hacking is a Good Career Option?
Tags: Ethical Hacking, Hacking, Cybersecurity, Cyber Security

In a world that is becoming increasingly digital, security has moved from being a technical concern to a business and national priority. Every organization - whether a startup, multinational company, government department, or hospital relies on digital systems to store data, run operations, and serve users. As cyber threat grow in number and sophestication, the demand for professionals who can protect these systems has skyrocketed. This is where ethical hacking emerges as not just a job, but a highly rewarding career path.
The future of Data Analytics: Where will Analysts be in 5 years?
Tags: Data Analytics, Data Analyst, Data Science

Data Analytics has been one of the most profitable streams lately for professionals with technical knowledge. The majority of companies around the world are paying huge sums of money to Data Analysts to understand the data and draw actionable insights from it. Below is my take on how I see the future of Data Analysts in the next 5 years.
What is Shadow AI?
Tags: Shadow AI, Artificial Intelligence, Unapproved Apps, Browser Extensions

Shadow AI refers to the unauthorized or unmonitored use of artificial intelligence tools, models, or features - especially within an organization without formal approval or oversight from IT, security or governance teams.