You are on page 1of 3

Brute Force Algorithm

The brute force technique is a trial-and-error process used by malicious hackers and other malicious
individuals to attempt hacking attacks by producing every possible combination of password-protected
data. Brute Force uses a machine's computing ability to try every possible combination to reach the aim.

How to create a brute force algorithm

Although, the brute force jargon in terms of computing, has become notorious as the go to tool, for
malicious workers online, the Brute Force can be used to solve a wide range of issues. 

BRUTE FORCE ATTACKER

This is another piece of computer science jargon for a hacker attempting to enter your personal area
online without your awareness. They just utilize the trial-and-error process of brute force algorithms to try
various password combinations against your account until they find the correct combination. There are
various kinds of brute force attacks.

(Ito ay isa pang piraso ng computer science jargon para sa isang hacker na sumusubok na pumasok sa
iyong personal na lugar online nang hindi mo nalalaman. Ginagamit lang nila ang trial-and-error na
proseso ng brute force algorithm upang subukan ang iba't ibang kumbinasyon ng password laban sa iyong
account hanggang sa mahanap nila ang tamang kumbinasyon. Mayroong iba't ibang uri ng pag-atake ng
brute force.)

 Simple brute force attacks:


This is a manual brute forcing technique through which the hacker will try to guess the most
probable password to your account. This works with very simple passwords such as “name1234”
for an example.

(Ito ay isang manu-manong pamamaraan ng brute forcing kung saan susubukan ng hacker na
hulaan ang pinakamalamang na password sa iyong account. Gumagana ito sa napakasimpleng
mga password tulad ng "name1234" para sa isang halimbawa.)
 Dictionary attacks:
A hacker selects a target and tests probable passwords against that username in a conventional
attack. This process is termed as q dictionary attack in cyber security terminology. In brute force
attacks, dictionary attacks are the most fundamental weapon. While these are not necessarily
brute force operations in and of themselves, they are frequently employed as a key component in
cracking passwords. Some hackers go through unabridged dictionaries and add extra characters
and numerals to words, or they employ special word dictionaries, although this form of
sequential assault is time-consuming.\

Sa isang tradisyonal na pag-atake, ang isang hacker ay pipili ng isang target at sinusuri ang mga
posibleng password laban sa pag-login na iyon. Sa wikang cyber security, kilala ito bilang pag-
atake ng q diksyunaryo. Ang mga pag-atake sa diksyunaryo ay ang pinakapangunahing tool sa
mga malupit na pag-atake. Bagama't ang mga ito ay hindi kinakailangang brute force na mga
operasyon sa loob at ng kanilang mga sarili, ang mga ito ay karaniwang ginagamit bilang isang
kritikal na bahagi sa pag-crack ng password. Ang ilang mga hacker ay gumagamit ng mga
diksyonaryo na hindi naka-bridge upang magdagdag ng mga karagdagang titik at digit sa mga
salita, o gumagamit sila ng mga espesyal na diksyunaryo ng salita, kahit na ang ganitong uri ng
sunud-sunod na pag-atake ay tumatagal ng oras.

Hybrid brute force attacks:


These attacks are a combination of both, the logical simple attacks and the dictionary attacks.
Basically, the attackers combine their logical number and word selection to the randomized brute
force word selection from a dictionary to come up with probable passwords.
(Ang mga pag-atake na ito ay kumbinasyon ng pareho, ang mga lohikal na simpleng pag-atake at
ang pag-atake ng diksyunaryo. Karaniwan, pinagsama ng mga umaatake ang kanilang lohikal na
numero at pagpili ng salita sa randomized na brute force na pagpili ng salita mula sa isang
diksyunaryo upang makabuo ng mga posibleng password.)

 Reverse brute force attacks:


These are the exact opposite of brute force attacks. The hacker is in possession of the password
rather than the username. Therefore in order to find the username, the attacker runs the password
against an indefinite amount of usernames available using a brute force algorithm.

(These are the inverse of brute force attacks. The hacker now has the password rather than the
username. In order to find the username, the attacker uses a brute force algorithm to run the
password against an infinite number of usernames.)

 Credential stuffing or credential retry:


The attacker who has discovered a successful combination of a username and a password uses a
brute force algorithm to stuff the identical credentials into all the other websites that the account
owner may be using. Because people are known to use the same username and password on
various websites, this strategy works much better than it should.

You might also like