2025.02 - Three Password Cracking Techniques and How To Defend Against Them
2025.02 - Three Password Cracking Techniques and How To Defend Against Them
How it works
When it comes to brute force attacks, malicious actors employ a range of tactics—
from simple brute force attacks that test every possible password combination to
more nuanced approaches like hybrid and reverse brute force attacks. Each method
has a distinct strategy behind it, but the motives behind brute force attacks are the
same: to gain unauthorized access to protected data or resources.
Some popular automated tools for carrying out brute force attacks include:
o John the Ripper: a multiplatform password cracker with support for 15
different operating systems and hundreds of hashes and cipher types
o L0phtCrack: a tool that uses rainbow tables, dictionaries, and multiprocessor
algorithms to crack Windows passwords
o Hashcat: a cracking/password recovery utility that supports five unique
modes of attack for over 300 highly-optimized hashing algorithms
Examples
Back in August 2021, U.S. mobile operator T-Mobile fell victim to a data breach that
started with a brute force attack. The security compromise resulted in the exposure
of over 37 million customer records containing sensitive data like social security
numbers, driver’s license information, and other personally identifiable data.
Defense measures
Users should choose strong, complex passwords and multi-factor authentication
(MFA) to protect against brute force attacks. Administrators should implement
account lockout policies and continuously audit their Windows environments for
weak and breached passwords. Tools like Specops Password Auditor can automate
these processes across expansive IT environments.
Dictionary attack
In a password dictionary attack, cyber attackers try to gain access by using a list of
common passwords or words from a dictionary. This predefined word list typically
includes the most often used words, phrases, and simple combinations (i.e.,
“admin123”). Password dictionary attacks underscore the importance of complex,
unique passwords, as these attack types are especially effective against weak or
easily guessable passwords.
How it works
The process starts with compiling a list of potential passwords from data breaches,
common password lists, or publicly available resources. Using an automated tool,
malicious actors perform a dictionary attack, systematically testing each password
against a target account or system. If a match is found, the hacker can gain access
and carry out subsequent attacks or movements.
Examples
Defense measures
How it works
Examples
Defense measures