Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Brute force"
From NetSec
(Created page with "A technique used to obtain authentication credentials see Category:Cryptography") |
GertieUbpgdd (Talk | contribs) |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | A technique used to obtain [[authentication | + | A '''brute force''' attack, or '''brute forcing''' is a highly primitive technique used to obtain [[authentication credential]]s by repeatedly guessing based on set parameters such as estimated length and characters used. The effectiveness of a brute-force attack is directly and exponentially related to the difficulty of the password. For instance, a single digit password of 0-9 would take a maximum of 10 tries, whereas a double digit would take 100, rather than 20. Similarly credentials which are longer or have a larger character set through the addition of special characters are exponentially more secure to this method of attack. |
+ | |||
+ | ==External Links== | ||
+ | http://www.hoobie.net/brutus/ - a popular brute forcer for Windows. |
Latest revision as of 10:05, 2 June 2012
A brute force attack, or brute forcing is a highly primitive technique used to obtain authentication credentials by repeatedly guessing based on set parameters such as estimated length and characters used. The effectiveness of a brute-force attack is directly and exponentially related to the difficulty of the password. For instance, a single digit password of 0-9 would take a maximum of 10 tries, whereas a double digit would take 100, rather than 20. Similarly credentials which are longer or have a larger character set through the addition of special characters are exponentially more secure to this method of attack.
External Links
http://www.hoobie.net/brutus/ - a popular brute forcer for Windows.