Dumpster Diving: Searching for sensitive information at the user's trash-bins, printer trash bins, and user desk for sticky notes.Īctive Online Attack: Dictionary, Brute Forcing and Rule-based Attack. Social Engineering: Convincing people to reveal passwords.Shoulder Surfing: Looking at either the user's keyboard or screen while he/she is logging in.Offline Attack: Attacker copies the target's password file and then tries to crack passwords in his own system at different location.Passive Online Attacks: Attacker performs password cracking without communicating with the authorizing party.Active Online Attacks: Attacker performs password cracking by directly communicating with the victim machine.Non-Electronic Attacks: Attacker need not posses technical knowledge to crack password, hence known as non-technical attack.Most of the password cracking techniques are successful due to weak or easily guessable passwords.Attackers use password cracking techniques to gain unauthorized access to the vulnerable system.Password cracking techniques are used to recover passwords from computer systems.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
May 2023
Categories |