Zz:http://www.williamlong.info/archives/1264.html
Personal Network Password security is an important part of the entire network security, if the personal password is hacked, will cause very serious consequences, such as network bank deposit is transferred misappropriation, network game equipment or property stolen, QQ coins stolen, etc. To enhance the Internet security awareness of Internet users is an important link in the process of network popularization, therefore, in the Internet users to take security measures to protect their network password, it is necessary to understand the popular network password crack method, to the appropriate remedy, the following is my summary of the 10 main network password cracking methods.
1. Violence and poor lifting
Password cracking technology is the most basic is the brute force, also known as password poor lift. If the hacker knew beforehand the account number, such as the mail account, QQ user account, online bank account, and so on, and the user's password is also set very simple, for example uses the simple numeral combination, the hacker uses the brute force hack tool to be able to crack the password quickly. Therefore, the user should try to set the password more complex.
2. Keystroke logging
If the user password is more complex, then it is difficult to use brute force to crack, then hackers often install Trojan virus to users, design "keystroke recording" program, record and listen to the user's keystroke operation, and then through a variety of ways to record the user keystroke content sent to the hacker, so, The hacker can decipher the user's password by analyzing the keystroke information.
3. Screen Recording
In order to prevent keystroke recording tool, the use of mouse and image input password, the hacker can be a Trojan horse program to screen down the user and record the location of the mouse click, by recording the mouse position compared to screenshots of the picture, thereby cracking the user password of such methods.
4. Phishing
Phishing attacks use fraudulent e-mails and bogus web sites to engage in fraudulent activities, often giving away sensitive information (such as usernames, passwords, account numbers, pin codes, or credit card details), and phishing mainly by sending e-mails to entice users to sign in to fake online banks, Online securities website, cheat user account password implementation theft.
5. Sniffer (Sniffer)
On a local area network, the most effective way for hackers to quickly get a large number of accounts (including usernames and passwords) is to use the sniffer program. Sniffer, Chinese translation as a sniffer, is a highly threatening passive attack tool. With this tool, you can monitor the state of the network, the flow of data, and the information transmitted over the network. When the information is transmitted in clear text on the network, it is possible to use network snooping to steal the transmitted packets on the Internet. The network interface is set in the listening mode, you can intercept the stream of information transmitted online. Any packet transmitted directly via HTTP, FTP, POP, SMTP, telnet protocol will be monitored by the sniffer program.
6, Password Reminder
For some local saved asterisk password, you can use a tool like password reminder to crack, the password reminder in the magnifying glass to drag and drop on the asterisk, you can crack this password.
7. Remote CONTROL
Using the remote control Trojan to monitor all the actions of the user's local computer, any keyboard and mouse actions of the user will be intercepted by the remote hacker.
8. Bad habits
Some of the company's employees set a long password, but the password is written on paper, people use their own name or their own birthday password, and some people use commonly used words to do passwords, these bad habits will cause the password is very easy to crack.
9. Analysis and Inference
If the user uses more than one system, the hacker can solve the simpler system's user password first, and then use the cracked password to deduce the user password of the other system, for example, many users use the same password for all systems.
10. Cryptography Psychology
Many well-known hackers hack password is not used in what cutting-edge technology, and just use the password psychology, from the user's psychological start, from the micro-start to analyze the user's information, analysis of the user's psychology, and thus faster to crack out the password. In fact, there are many ways to obtain information, password psychology if mastered well, can be very fast to crack access to user information.
Ten common ways to crack network passwords