1.4.7

Cracking Passwords

Test yourself

Cracking Passwords

Many hackers focus their attention on cracking passwords to overcome authentication mechanisms.

Illustrative background for Cracking passwordsIllustrative background for Cracking passwords ?? "content

Cracking passwords

  • Authentication is the name for any methods which allow users to prove that an account is theirs.
    • The most common authentication method is using a password.
    • Many hackers want to find people's passwords, so that they can gain access to accounts:
    • Finding people's passwords is called cracking the password.
Illustrative background for The brute force attackIllustrative background for The brute force attack ?? "content

The brute force attack

  • A brute force attack tries to crack a password by trying every single combination of letters and numbers until the correct one is found.
  • This can take a very long time, although special software is used to do this which makes it possible to make millions of attempts per second.
Illustrative background for The dictionary attackIllustrative background for The dictionary attack ?? "content

The dictionary attack

  • A quicker form of the brute force attack is the dictionary attack.
  • Rather than attempting every single combination, a dictionary attack tries words from a predetermined list:
    • A common dictionary to use would be a list of common passwords.
Illustrative background for Protection against crackingIllustrative background for Protection against cracking ?? "content

Protection against cracking

  • Writing a network policy which enforces strong passwords can protect against dictionary attacks.
  • Using two-factor authentication can prevent the hacker from logging in, even if they have the password.
  • Restricting the number of failed password attempts before an account is 'locked' for a fixed period of time can deter hackers.

Jump to other topics

1Computer Systems

1.1Systems Architecture

1.2Memory & Storage

1.3Computer Networks, Connections & Protocols

1.4Network Security

1.5Systems Software

1.6Ethical, Legal, Cultural & Environmental Concern

2Computational Thinking, Algorithms and Programming

2.1Algorithms

2.2Programming Fundamentals

2.3Producing Robust Programs

2.4Boolean Logic

2.5Programming Languages & IDEs

Go student ad image

Unlock your full potential with GoStudent tutoring

  • Affordable 1:1 tutoring from the comfort of your home

  • Tutors are matched to your specific learning needs

  • 30+ school subjects covered

Book a free trial lesson