1.4.5

Common Active Attacks

Test yourself

Cracking Passwords

Many hackers focus their attention on cracking passwords to overcome authentication mechanisms.

Illustrative background for Cracking passwordsIllustrative background for Cracking passwords ?? "content

Cracking passwords

  • Authentication is the name for any methods which allow users to prove that an account is theirs.
    • The most common authentication method is using a password.
    • Many hackers want to find people's passwords, so that they can gain access to accounts:
    • Finding people's passwords is called cracking the password.
Illustrative background for The brute force attackIllustrative background for The brute force attack ?? "content

The brute force attack

  • A brute force attack tries to crack a password by trying every single combination of letters and numbers until the correct one is found.
  • This can take a very long time, although special software is used to do this which makes it possible to make millions of attempts per second.
Illustrative background for The dictionary attackIllustrative background for The dictionary attack ?? "content

The dictionary attack

  • A quicker form of the brute force attack is the dictionary attack.
  • Rather than attempting every single combination, a dictionary attack tries words from a predetermined list:
    • A common dictionary to use would be a list of common passwords.
Illustrative background for Protection against crackingIllustrative background for Protection against cracking ?? "content

Protection against cracking

  • Writing a network policy which enforces strong passwords can protect against dictionary attacks.
  • Using two-factor authentication can prevent the hacker from logging in, even if they have the password.
  • Restricting the number of failed password attempts before an account is 'locked' for a fixed period of time can deter hackers.

Denial of Service Attacks

Denial of service (DoS) attacks try to prevent a network from functioning by flooding it with useless traffic.

Illustrative background for Denial of service attacksIllustrative background for Denial of service attacks ?? "content

Denial of service attacks

  • DoS attacks attempt to bring down a server by flooding it with loads of useless requests.
  • The attack aims to overload the server. This stops the server responding to legitimate requests.
Illustrative background for Protection against DoS attacksIllustrative background for Protection against DoS attacks ?? "content

Protection against DoS attacks

  • To protect against DoS attacks, a server's firewall can blacklist (ban) any traffic from an IP address which is known to perform DoS attacks.
  • Firewalls can also monitor traffic in real time. So if a new IP address starts to send too much traffic then traffic limits can be set.
Illustrative background for Distributed DoS attacksIllustrative background for Distributed DoS attacks ?? "content

Distributed DoS attacks

  • Distributed DoS (DDos) attacks are commonly used to overcome the blacklisting of an IP address because of a high number of requests.
  • In a DDoS attack, the requests are sent from an army of compromised machines, known as a botnet.
  • Botnet machines are infected with malware which allows a hacker to send requests from their computer.
  • The botnet can launch a huge number of simultaneous requests. The owners of the devices in the botnet might not even realise they are taking part.

Jump to other topics

1Computer Systems

1.1Systems Architecture

1.2Memory & Storage

1.3Computer Networks, Connections & Protocols

1.4Network Security

1.5Systems Software

1.6Ethical, Legal, Cultural & Environmental Concern

2Computational Thinking, Algorithms and Programming

Go student ad image

Unlock your full potential with GoStudent tutoring

  • Affordable 1:1 tutoring from the comfort of your home

  • Tutors are matched to your specific learning needs

  • 30+ school subjects covered

Book a free trial lesson