Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Brute force"
From NetSec
(markup) |
GertieUbpgdd (Talk | contribs) |
||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
− | A technique used to obtain [[authentication | + | A '''brute force''' attack, or '''brute forcing''' is a highly primitive technique used to obtain [[authentication credential]]s by repeatedly guessing based on set parameters such as estimated length and characters used. The effectiveness of a brute-force attack is directly and exponentially related to the difficulty of the password. For instance, a single digit password of 0-9 would take a maximum of 10 tries, whereas a double digit would take 100, rather than 20. Similarly credentials which are longer or have a larger character set through the addition of special characters are exponentially more secure to this method of attack. |
+ | |||
+ | ==External Links== | ||
+ | http://www.hoobie.net/brutus/ - a popular brute forcer for Windows. |
Latest revision as of 10:05, 2 June 2012
A brute force attack, or brute forcing is a highly primitive technique used to obtain authentication credentials by repeatedly guessing based on set parameters such as estimated length and characters used. The effectiveness of a brute-force attack is directly and exponentially related to the difficulty of the password. For instance, a single digit password of 0-9 would take a maximum of 10 tries, whereas a double digit would take 100, rather than 20. Similarly credentials which are longer or have a larger character set through the addition of special characters are exponentially more secure to this method of attack.
External Links
http://www.hoobie.net/brutus/ - a popular brute forcer for Windows.