Ten common ways to crack network passwords

Source: Internet
Author: User
Tags mail account

Zz:http://www.williamlong.info/archives/1264.html

Personal Network Password security is an important part of the entire network security, if the personal password is hacked, will cause very serious consequences, such as network bank deposit is transferred misappropriation, network game equipment or property stolen, QQ coins stolen, etc. To enhance the Internet security awareness of Internet users is an important link in the process of network popularization, therefore, in the Internet users to take security measures to protect their network password, it is necessary to understand the popular network password crack method, to the appropriate remedy, the following is my summary of the 10 main network password cracking methods.

  1. Violence and poor lifting

Password cracking technology is the most basic is the brute force, also known as password poor lift. If the hacker knew beforehand the account number, such as the mail account, QQ user account, online bank account, and so on, and the user's password is also set very simple, for example uses the simple numeral combination, the hacker uses the brute force hack tool to be able to crack the password quickly. Therefore, the user should try to set the password more complex.

  2. Keystroke logging

If the user password is more complex, then it is difficult to use brute force to crack, then hackers often install Trojan virus to users, design "keystroke recording" program, record and listen to the user's keystroke operation, and then through a variety of ways to record the user keystroke content sent to the hacker, so, The hacker can decipher the user's password by analyzing the keystroke information.

  3. Screen Recording

In order to prevent keystroke recording tool, the use of mouse and image input password, the hacker can be a Trojan horse program to screen down the user and record the location of the mouse click, by recording the mouse position compared to screenshots of the picture, thereby cracking the user password of such methods.

  4. Phishing

Phishing attacks use fraudulent e-mails and bogus web sites to engage in fraudulent activities, often giving away sensitive information (such as usernames, passwords, account numbers, pin codes, or credit card details), and phishing mainly by sending e-mails to entice users to sign in to fake online banks, Online securities website, cheat user account password implementation theft.

  5. Sniffer (Sniffer)

On a local area network, the most effective way for hackers to quickly get a large number of accounts (including usernames and passwords) is to use the sniffer program. Sniffer, Chinese translation as a sniffer, is a highly threatening passive attack tool. With this tool, you can monitor the state of the network, the flow of data, and the information transmitted over the network. When the information is transmitted in clear text on the network, it is possible to use network snooping to steal the transmitted packets on the Internet. The network interface is set in the listening mode, you can intercept the stream of information transmitted online. Any packet transmitted directly via HTTP, FTP, POP, SMTP, telnet protocol will be monitored by the sniffer program.

  6, Password Reminder

For some local saved asterisk password, you can use a tool like password reminder to crack, the password reminder in the magnifying glass to drag and drop on the asterisk, you can crack this password.

  7. Remote CONTROL

Using the remote control Trojan to monitor all the actions of the user's local computer, any keyboard and mouse actions of the user will be intercepted by the remote hacker.

  8. Bad habits

Some of the company's employees set a long password, but the password is written on paper, people use their own name or their own birthday password, and some people use commonly used words to do passwords, these bad habits will cause the password is very easy to crack.

  9. Analysis and Inference

If the user uses more than one system, the hacker can solve the simpler system's user password first, and then use the cracked password to deduce the user password of the other system, for example, many users use the same password for all systems.

  10. Cryptography Psychology

Many well-known hackers hack password is not used in what cutting-edge technology, and just use the password psychology, from the user's psychological start, from the micro-start to analyze the user's information, analysis of the user's psychology, and thus faster to crack out the password. In fact, there are many ways to obtain information, password psychology if mastered well, can be very fast to crack access to user information.

Ten common ways to crack network passwords

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.