You are on page 1of 1

Attacker gains physical

Resetting access to computer and


resets password

Not really practical -


Online guessing
will take TOO long

Phishing, shoulder
surfing, dumpster Social engineering
diving

Keylogger, protocol
analyser (e.g.,
Wireshark)
Capturing
Method used by most
Man-in-the-middle and password attacks today
replay attacks Attacks on Passwords

Compare with
Attackers steal file with
Substituting letters/ encrypted passwords
encrypted password
placing numbers within they have created
words
Offline cracking
Every possible
Spelling words combination of letters,
backwards numbers, and
Slightly alter dictionary
Hybrid attack 1. Brute force characters used to
words
create encrypted
Slightly misspelling passwords and matched
words against stolen file
Offline cracking types:

Including special Attacker creates


characters encrypted versions of
common dictionary
2. Dictionary attack
words, Compares
against stolen password
Large pre-generated file
data set of encrypted
passwords

Used for reversing


cryptographic hash
Rainbow tables functions

Used in recovering a
plaintext password up
to a certain length
consisting of a limited
set of characters

You might also like