How Hackers Crack Passwords

Table of contents:

How Hackers Crack Passwords
How Hackers Crack Passwords

Video: How Hackers Crack Passwords

Video: How Hackers Crack Passwords
Video: This is How Hackers Crack Passwords! 2024, November
Anonim

Most Internet users have experienced account theft - many hackers are doing this on a really huge scale. However, few people know how the hacking process takes place.

How hackers crack passwords
How hackers crack passwords

Instructions

Step 1

The most common option is to brute-force common passwords. These include, first of all, "12345", "qwerty" and even "password". By the way, by combining such words, you are unlikely to save your account from hacking. Programs are able to iterate over their combinations and writing in a different layout.

Step 2

The second method is similar to the first, but the probability of being hacked is higher. In addition to the most common passwords, hackers begin to sort out all the words and variations in general. This method is called brute force (or abbreviated as brute force). This is a very long and costly way. It is extremely rarely used for mass hacking, more often brute force is aimed at an individual victim.

Step 3

Using a rainbow table. This fancy name hides a huge database of computed hashes that are used on most modern sites. Hashes are the numeric value of the encrypted password. This method is noticeably faster than the previous one, but it also takes a lot of time. The fact is that to use a hash, you must first find it from a huge table with millions of names.

Step 4

Many sites have protection against such hacks. They simply add a few random characters to the password before encryption. But they tried to get around this problem and created a complicated rainbow table. It should be noted that modern capacities with the help of it only allow cracking a password up to 12 characters. However, only government hackers can do this.

Step 5

The easiest way to get a password is to ask the user for it. This method is called phishing, or fishing. A fake page is created that looks exactly like the account login page. The user enters a username and password, after which the system simply remembers the data, enters the page and changes the data.

Step 6

Many well-known hackers use a technique called social engineering. The bottom line is that some office worker is called under the guise of an information security service and asked to provide a password from the network. Surprisingly, this method works 90% of the time.

Step 7

You can give hackers the password for your account simply by installing some free application. Together with him, a virus will sneak onto your computer, copy the entered data and send them to the hacker. These can be both applications that completely record user actions, and full-fledged programs that are capable of blocking or even deleting all data.

Recommended: