10 methods used by hackers to crack passwords

Source: Internet
Author: User

10 methods used by hackers to crack passwords

 

Brute force cracking

Brute-force password cracking is also known as brute-force password cracking. If the hacker knows the account number in advance, such as the email account, QQ user account, and online bank account, and the user's password is set very simple, such as using a simple combination of numbers, hackers can use brute-force cracking tools to quickly crack passwords. Therefore, users should try to make password settings more complex.

Cracking network passwords-hitting key records

If the user password is complex, it is difficult to use brute-force cracking. In this case, Hackers often design a "key-record" program by installing a Trojan to the user, record and listen to the user's key operations, and then send the recorded User Key content to the hacker in various ways. In this way, the hacker can crack the user's password by analyzing the user's key information.

Cracking network passwords-screen record

To prevent the key logging tool from using the mouse and image to enter the password, hackers can use a trojan program to take a screenshot of the user's screen and record the location where the mouse clicks, record the mouse position and compare screenshots to crack the user password of this method.

Password cracking-phishing

Phishing attacks use fraudulent emails and forged websites to log on to the website for fraud, scammers often disclose sensitive information (such as user name, password, account, PIN code, or credit card details ), phishing mainly induces users to log on to fake online banking and online securities websites by sending e-mails to defraud users of account and password theft.

Network password cracking-Sniffer (Sniffer)

On a LAN, the most effective means for hackers to quickly obtain a large number of accounts (including user names and passwords) is to use the Sniffer program. Sniffer is a threatening passive attack tool. This tool monitors the network status, data flow, and information transmitted over the network.

When information is uploaded and transmitted over the network in plain text, you can use a network listener to steal packets transmitted over the Internet. By setting the network interface in the listening mode, you can capture the continuously transmitted information on the Internet. Any data packets transmitted directly through HTTP, FTP, POP, SMTP, or TELNET are monitored by the Sniffer program.

Password cracking-Password Reminder

You can use a tool like Password Reminder to crack some locally stored passwords by using a star number. Drag the magnifier in Password Reminder to the asterisk to crack the Password.

Cracking network passwords-Remote Control

The remote control trojan monitors all operations on the user's local computer, and any keyboard and mouse operations of the user will be intercepted by remote hackers.

Cracking network passwords-bad habits

Some employees in some companies set a long password, but write the password on paper. Some people use their own names or their own birthdays as passwords, some people use frequently-used words as passwords. these bad habits will lead to easy password cracking.

Cracking network passwords-analytical reasoning

If a user uses multiple systems, the hacker can first crack the user password of a relatively simple system, and then use the password that has been cracked to calculate the user password of other systems, for example, many users use the same password for all systems.

 

Cracking network passwords-Password Psychology

 

Many well-known hackers do not use any cutting-edge technology to crack passwords. Instead, they only use password psychology, starting with the user's psychology and analyzing user information in a subtle way, analyzes users' psychology to crack passwords more quickly. In fact, there are still many ways to obtain information. If the password psychology is well mastered, it can quickly crack and obtain user information.

Passwords are one of the most effective and practical tools to protect our privacy. However, during the application process, we should also pay attention to the existence of security issues and the ever-changing methods of hackers, we are also very difficult to cope with. We hope that readers can understand the above methods to crack passwords and fundamentally understand hackers so that they can take the right remedy.

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.