Brute Force attack:
It is an attack which includes all the possible permutation and combinations of passwords. But, it is very time consuming. As it takes a lot of efforts to try all possible combinations. for example if a password is 6 digit long then 10^6 combinations are possible. if it include alphabet or special characters then its complexity is even more. tool: brutus
Dictionary Attack:
In this attack attacker uses a set of words or string of possible and frequently used passwords. It is effective than bruteforce attack.
Keyloggers: There are many keyloggers available. You can download it by google search. But beware, your antivirus may treat it as a virus. It can be used as a spy to your computer. It records keystrokes, pictures of your screen at certain intervals and many more activities associated with your computer as per your settings.
Tips:
#Always remember u should keep your password long and atleast containg two types i.e alphabet and numbers or any special characters.
#Have some recovery method for passwords associated with the email ids in case they are hacked by someone.
It is an attack which includes all the possible permutation and combinations of passwords. But, it is very time consuming. As it takes a lot of efforts to try all possible combinations. for example if a password is 6 digit long then 10^6 combinations are possible. if it include alphabet or special characters then its complexity is even more. tool: brutus
Dictionary Attack:
In this attack attacker uses a set of words or string of possible and frequently used passwords. It is effective than bruteforce attack.
Keyloggers: There are many keyloggers available. You can download it by google search. But beware, your antivirus may treat it as a virus. It can be used as a spy to your computer. It records keystrokes, pictures of your screen at certain intervals and many more activities associated with your computer as per your settings.
Tips:
#Always remember u should keep your password long and atleast containg two types i.e alphabet and numbers or any special characters.
#Have some recovery method for passwords associated with the email ids in case they are hacked by someone.
No comments:
Post a Comment