Hacking techniques Introduction to password cracking
Level: Introductory (email@example.com), Lead Network and Security Engineer01 Jun 2009Password and user account exploitation is one of largest issues innetwork security. In this article Rob Shimonski will look at password cracking: the how and why of it. Rob will explain just how easy it isto penetrate a network, how attackers get in, the tools they use, and ways to combat it. More dW content related to: password hacking. techniques Attacks on a company or organization's computer systems take manydifferent forms, such as spoofing, smurfing, and other types ofDenial of Service (DoS) attacks. These attacks are designed to harm or interrupt the use of your operational systems. This article dealswith a single wide-spread form of attack known as password cracking.Password cracking is a term used to describe the penetration of anetwork, system, or resource with or without the use of tools tounlock a resource that has been secured with a password. In thisarticle I will take a look at what password cracking is, whyattackers do it, how they achieve their goals, and what you can do todo to protect yourself. I will briefly take a look at the attackersthemselves: their psychological makeup and their motives. Through anexamination of several scenarios, I will describe some of thetechniques they deploy and the tools that aid them in their assaults,and how password crackers work both internally and externally to violate a company's infrastructure. Finally, the article provides achecklist to help protect you from password cracking.Before exploring the methods for doing this, let's first peer intothe mind of the attacker and learn why they might want access to yournetwork and systems. Attackers: how and why they attackThere is an on-going debate about the definition of the word hacker. A hacker can be anyone with a deep interest in computer-based technology; it does not necessarily define someone who wants to doharm. The term attacker can be used to describe a malicious hacker. Another term for an attacker is a black hat. Security analysts areoften called white hats, and white-hat analysis is the use of hackingfor defensive purposes.