Password Attack
Password Attack
On
Password Attack
In partial fulfillment for the award of the degree
Of
BACHELOR OF COMPUTER APPLICATION
[B.C.A]
Year 2023-2024
BCA-6th SEMESTER
Submitted to:
o Non-electric attacks
o Online attacks
o Offline attacks
1) Non-electric attacks
A non-electric attack is a type of attack that uses chicanery to get sensitive
information of users or perform actions through which the security of a
network will be compromised. Non-electric attacks are as follows:
Social Engineering
Social engineering is the process in which a user is tricked into believing that
the hacker is a legitimate agent. The hacker uses a common tactic. Hacker
poses as technical support and calls a victim. Hackers ask for a network access
password so that he can provide assistance. If the person has done this using
fake credentials and fake uniforms, this technique will become effective. But
these days, this technique is less common.
Shoulder Surfing
Shoulder attacks are performed by the most confident hackers. The hacker can
take the look of an aircon service technician, parcel courier or anything else so
that they can easily access an office building. Once they entered the office,
they will get a kind of free pass, and they can note the passwords that are
entered by the staff members of the company.
The Brazen example includes hackers who distinguish themselves so that they
can gain access to the company sites. To grab the sensitive information,
documents and passwords, they look over the employee's shoulders. This
attack mostly affects the smaller business.
Recently the security experts get some vulnerability in the process of
authentication used by WhatsApp. If the user takes a new device and wants to
use Whatsapp, he has to enter a unique code that is sent on the number via
text message. By using that code, the account of a user can be restored, and
the chat history can also be retrieved from the background. It was found that if
an attacker knows the phone number of a user, they can download Whatsapp
on a new device, and after downloading, they issue a prompt for a new code. If
the hacker uses a spying device, they can copy the code as it arrives on the
user's own device.
Spidering
The techniques which are used in phishing attacks and social engineering
attacks are also used in spidering. Savvy hackers have understood that the
passwords used in the corporate office are made of business-related words. In
the brute force attack, the custom words list is built by Website sales material,
listed customers on websites, studying corporate literature, and website of
competitions. The process is automated by really savvy hackers.
Using spidering, a hacker knows their target and based on the target's activity;
they can get the credentials. For example, many companies set their internal
service password related to their business so that their employees can easily
remember them. If a hacker targets a company and knows their works, they
may try and access their networks or handbooks of their employee to further
their understanding. Hackers can also create a list of all possible combinations
of words by studying the products that the company creates. That list can be
further used in brute force attacks.
2) Online attacks
Active online attacks can be categorized as follows:
Guess
Guess is like a best friend of password cracker. If all the attacks fail, the hacker
can try to guess your password. These days, there are various password
managers who create various password strings that are impossible to guess for
a hacker. Many users set a random password based on their memorable phase
of life like family, interests, pets, dob, hobbies, and so on. The password can
also be based on things that you like to chat about on social networks, and the
things can also include in your profile. When the password crackers attempt to
get a customer-level password, they will look at this information and make a
guess based on the available information on social networks. If you want to
protect yourself from guess, you should use a password manager and maintain
password hygiene. Many password managers are free so that you can use
them.
Dictionary attack
This attack shows a sophisticated brute force attack example. In the Dictionary
attack, an attacker uses a dictionary that contains words. The words are
nothing but a straightforward name. In other words, the attacker uses the
words that most of the users use as their password. In dictionary attacks, every
word in the dictionary is a test in seconds. Most of the dictionary contains the
credentials gained from previously hacked passwords. Dictionary also contains
the word combinations and most commonly used passwords.
A hacker knows all the clever tricks. So if the user groups the works like
"superadministratorguy" or "bestmommy", it will not prevent the password
from a hacker. It will only increase a few extra seconds to being hacked. Many
people use their memorable phrases like gf name, dob, bf name and so on as
their password and dictionary attack takes advantage of this fact. That's why
while creating the password system urges the user to enter multiple character
types.
Phishing
Phishing is a very easy way to hack the password of any user. In this attack, the
hacker asks the user to enter his password. In the phishing email, a hacker sent
the fake login page to the unsuspected user, which is associated with any
service, the hacker wants to access. The page requests the user to write some
terrible problem which he finds in their security. After that, the page skims
their password. Now the hackers can use that password to get the sensitive
information of the user. When the users are giving you a password happily,
then why will you trouble to crack the passwords.
Malware
The Umbrella of malware contains a host of malicious tools, screen scrapers,
and keyloggers. To steal the person's information, these malicious software are
used. Ransomware software, which is highly disruptive malicious software,
attempts to block the access of the entire system. The malware families have
some highly specialized malware that specially targets the password.
The activity of a user is recorded by Keyloggers and their ilk. Keyloggers can
record it through screenshots or keystrokes and then shared it with the
attacker. Some malware attacks hurt the existence of the web browser's client
password file. If the file is not properly encrypted, the hacker can easily access
the saved password from the browser history of the user.
3) Offline attacks
Offline attacks are as follows:
Offline Cracking
We should remember that not all attackers hack through the internet
connection. Mostly works done offline. You imagine that through the blocking
automated guessing application, your password is safe. In this application, if a
user enters the wrong passwords three or four times, the system lockout the
user. This process will be true if all password hacking takes place online, but it's
not. Offline hacking takes place using the hashes set in the password file, which
was obtained from a compromised system.
Through the hack on the third party, the target compromises. They provide
access to the hash file of the user's password and system server. Now the
hacker can take time to try and access the code without knowing the individual
user or target system. When the initial attack succeeds, this attack will be
done, whether hackers access a database by the stumbling or by the SQL
injection attack or gain elevated privileges upon an unprotected server.
The Rainbow table is one step further from the rainbow. Rainbow provides
password and hash, but the rainbow table uses the hash algorithm and
provides the list of all possible encrypted password's pain text versions. If the
hacker discovers any encrypted password in a company system, they can
compare this encrypted password with the list provided by the rainbow table.
Before the attack takes place, if most of the computation is done, launching an
attack will become quicker and easier as compared to other methods.
Network Analyzers
Network analyzers are the type of tools that allows monitor and intercept the
package, which is sent over the network. The package contains a plain text
password, and that tool lifts that password.
Without the malware, an attacker cannot access the physical network. The
network analysis does not rely on exploiting network bugs and system
vulnerability. In any attack, the first phase is network analyzers followed up
with brute force attacks.
We can also use the same tools in our business to scan our network, which is
useful for troubleshooting and running diagnostics. Using these tools, the
admin can find out the information which is transmitted as plain text. He can
put policies in place of information and prevent this from happening. If you
route your traffic through a VPN (Virtual private network), you can prevent
yourself from this attack.
Mask attack
This attack is specific in its scope. In a mask attack, the guess is based on
numbers or characters. For example, if a password starts with a number and
the hacker knows about it, they can tailor the mask to try only those types of
passwords, which start with numbers. Some criteria to configure the masks are
special character, the arrangement of character, number of a repeated single
character, password length, etc. The goal of mask attack is to remove the
unnecessary characters and reduce the time while cracking a password.
But even if our reliance on passwords has remained consistent, the threats to
password security have not. Today, passwords are more vulnerable than
ever; passwords and credentials were exploited in 81% of company data
breaches in 2020, making password attacks the most-commonly-used threat
vector for cyber criminals to gain access to otherwise-secure systems. To
combat these mounting threats, system administrators around the world have
enacted stricter and stricter password requirements. But while longer
password lengths and the inclusion of special characters may make a password
more difficult to crack, it also makes it more difficult to use.
The end result? Frustrated employees who take their own steps to make
password management more manageable. Unfortunately, by reusing
passwords, creating easy-to-remember (and easy-to-guess) passwords, and
saving password information in insecure areas, these users are putting
themselves, their companies, and others at risk.
Here, we take a look at password attacks, what common types and categories
you need to be aware of, and how you can protect your vital data in an era
where traditional approaches to passwords may no longer be effective.
Example :-
One of the most prevalent password attacks involves attackers
convincing the victim that their account will be deactivated if their login
credentials aren't verified.
The attacker sends phishing emails to users, alerting them that their
account has been compromised and that their credit card and login
information are required to keep the account open. The email contains a
link that looks identical to the legitimate website, but leads to the
hacker's malicious website. When the victim clicks on this link, they are
routed to a fake confirmation screen where they enter their valid login
credentials. The hacker then steals the victim's credentials and uses
them to access their legitimate account.
Check who sent the email: look at the From: line in every email to
ensure that the person they claim to be matches the email address
you're expecting.
Double check with the source: when in doubt, contact the person who
the email is from and ensure that they were the sender.
Check in with your IT team: your organization's IT department can often
tell you if the email you received is legitimate.
2. Man-in-the-Middle Attack
Man-in-the middle (MitM) attacks are when a hacker or compromised system
sits in between two uncompromised people or systems and deciphers the
information they're passing to each other, including passwords. If Alice and
Bob are passing notes in class, but Jeremy has to relay those notes, Jeremy has
the opportunity to be the man in the middle. Similarly, in 2017, Equifax
removed its apps from the App Store and Google Play store because they were
passing sensitive data over insecure channels where hackers could have stolen
customer information.
4. Dictionary Attack
A type of brute force attack, dictionary attacks rely on our habit of picking
"basic" words as our password, the most common of which hackers have
collated into "cracking dictionaries." More sophisticated dictionary attacks
incorporate words that are personally important to you, like a birthplace,
child's name, or pet's name.
Monitor your accounts. There are paid services that will monitor your
online identities, but you can also use free services like
haveIbeenpwned.com to check whether your email address is connected
to any recent leaks.
Regularly change your passwords. The longer one password goes
unchanged, the more likely it is that a hacker will find a way to crack it.
Use a password manager. Like a dictionary attack, many credential
stuffing attacks can be avoided by having a strong and secure password.
A password manager helps maintain those.
6. Keyloggers
Keyloggers are a type of malicious software designed to track every keystroke
and report it back to a hacker. Typically, a user will download the software
believing it to be legitimate, only for it to install a keylogger without notice.
In essentially every case, preventing a breach is easier and more effective than
attempting to deal with one after the fact. Training employees in security best
practices particularly where passwords are concerned is perhaps the most
vital, most powerful step you can take towards securing your systems. When
authorized users are aware of the threats and committed to doing their part to
counter them, then the risk of password theft decreases significantly.
The best way to fix a password attack is to avoid one in the first place. Ask
your IT professional about proactively investing in a common security
policy that includes:
Create complex passwords
This may seem obvious, but creating strong, reliable passwords is essential
to protect your data. Reusing passwords or creating basic phrases could
make you susceptible to cyberattacks, such as password spraying,
credential stuffing, and more.
Now that you know the types of password attacks and how to avoid them,
the next step in your cybersecurity journey may be learning how to create
a hack-proof password on your own. Regardless, with these skills at your
disposal, your passwords could potentially help protect against any
password attack that comes your way.
Advantages of password attack
It's important to remember that password attacks are illegal and unethical. If
you're interested in learning more about ethical hacking techniques used for
penetration testing to improve system security, I can provide some resources
on that topic.
Disadvantagesof password attack :-
Loss of Data and Privacy: A successful attack can expose sensitive data
like financial information, personal details, or confidential documents.
Financial Loss: Attackers can steal money directly from bank accounts or
use stolen credit cards for unauthorized purchases.
Identity Theft: Stolen passwords can be used for identity theft, allowing
attackers to impersonate the victim and cause significant financial and
personal damage.
Disruption and Downtime: Password attacks can disrupt operations and
cause system downtime. This can be particularly damaging for
businesses that rely on online systems.
Reputation Damage: Data breaches caused by password attacks can
damage an organization's reputation and erode customer trust.
Additional Disadvantages:
Google
Youtube
https://www.javatpoint.com
https://www.pivotpointsecurity.com
https://newsroom.cisco.com
https://us.norton.com