What is a brute-force attack? - Definition from TechTarget (2024)

What is a brute-force attack? - Definition from TechTarget (1)

By

  • Katie Terrell Hanna

What is a brute-force attack?

A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems. Using brute force is an exhaustive effort rather than employing intellectual strategies.

Just as a criminal might break into and crack a safe by trying many possible combinations, a brute-force attack of applications tries all possible combinations of legal characters in a sequence. Cybercriminals typically use a brute-force attack to obtain access to a website, account or network. They may then install malware, shut down web applications or conduct data breaches.

A simple brute-force attack commonly uses automated tools to guess all possible passwords until the correct input is identified. This is an old but still effective attack method for cracking common passwords.

How long a brute-force attack lasts can vary. Brute-forcing can break weak passwords in a matter of seconds. Strong passwords can typically take hours or days.

Organizations can use complex password combinations to extend the attack time, buying time to respond to and thwart the cyber attack.

What are the different types of brute-force attacks?

Different types of brute-force attacks exist, such as the following:

  • Credential stuffing occurs after a user account has been compromised and the attacker tries the username and password combination across multiple systems.
  • A reverse brute-force attack begins with the attacker using a common password -- or already knowing a password -- against multiple usernames or encrypted files to gain network and data access. The hacker will then follow the same algorithm as a typical brute-force attack to find the correct username.
  • A dictionary attack is another type of brute-force attack, where all words in a dictionary are tested to find a password. Attackers can augment words with numbers, characters and more to crack longer passwords.

Additional forms of brute-force attacks might try and use the most commonly used passwords, such as "password," "12345678" -- or any numerical sequence like this -- and "qwerty," before trying other passwords.

What is the best way to protect against brute-force attacks?

Organizations can strengthen cybersecurity against brute-force attacks by using a combination strategies, including the following:

  • Increasing password complexity. This extends the time required to decrypt a password. Implement password manager rules, like minimum passphrase length, compulsory use of special characters, etc.
  • Limiting failed login attempts. Protect systems and networks by implementing rules that lock a user out for a specified amount of time after repeat login attempts.
  • Encrypting and hashing. 256-bit encryption and password hashes exponentially increase the time and computing power required for a brute-force attack. In password hashing, strings are stored in a separate database and hashed so the same password combinations have a different hash value.
  • Implementing CAPTCHAs. These prevent the use of brute-force attacking tools, like John the Ripper, while still keeping networks, systems and websites accessible for humans.
  • Enacting two-factor authentication. This is a type of multifactor authentication that adds an additional layer of login security by requiring two forms of authentication -- as an example, to sign in to a new Apple device, users need to put in their Apple ID along with a six-digit code that is displayed on another one of their devices previously marked as trusted.

A good way to secure against brute-force attacks is to use all or a combination of the above strategies.

What is a brute-force attack? - Definition from TechTarget (2)

How can brute-force attack tools improve cybersecurity?

Brute-force attack tools are sometimes used to test network security. Some common ones are the following:

  • Aircrack-ng can be used to test Windows, iOS, Linux and Android. It uses a collection of widely used passwords to attack wireless networks.
  • Hashcat can be used to strength test Windows, Linux and iOS from brute-force and rule-based attacks.
  • L0phtCrack is used to test Windows system vulnerabilities against rainbow table attacks. No longer supported, new owners -- as of summer 2021 -- are exploring open sourcing, among other unnamed options for the software.
  • John the Ripper is a free, open source tool for implementing brute-force and dictionary attacks. It is often used by organizations to detect weak passwords and improve network security.

What is a brute-force attack? - Definition from TechTarget (3)IT can use the wireless network auditing tool Aircrack-ng to test password security.

What are examples of brute-force attacks?

  • In 2009, Attackers targeted Yahoo accounts using automated password cracking scripts on a Yahoo web services-based authentication application thought to be used by internet service providers and third-party web applications.
  • In 2015, threat actors breached nearly 20,000 accounts by making millions of automated brute-force attempts to access Dunkin's mobile app rewards program for DD Perks.
  • In 2017, cybersecurity criminals used brute-force attacks to access the U.K. and Scottish Parliament internal networks.
  • In 2018, brute-force attackers cracked passwords and sensitive information of millions of Cathay Pacific airline passengers.
  • In 2018, it became known that a Firefox bug exposed the browser's master password to brute-force attacks against insufficient Secure Hash Algorithm 1 hashing left unfixed for almost nine years.
  • In 2021, the National Security Agency warned of brute-force password attacks being launched from a specially crafted Kubernetes cluster by a unit within Russia's foreign intelligence agency.
  • In 2021, hackers gained access to T-Mobile testing environments and then used brute-force attacks and other means to hack into other IT servers, including those that contained customer data.

This was last updated in September 2021

Continue Reading About brute-force attack

  • How to use hashcat to address authentication vulnerabilities
  • What is a password spraying attack and how does it work?
  • The top 6 SSH risks and how regular assessments cut danger
  • Create and enforce a password policy across the enterprise

Related Terms

What is cloud detection and response (CDR)?
Cloud computing requires a security approach that is different than traditional protections. Where does cloud detection and ...Seecompletedefinition
What is cybercrime and how can you prevent it?
Cybercrime is any criminal activity that involves a computer, network or networked device.Seecompletedefinition
What is threat detection and response (TDR)? Complete guide
Threat detection and response (TDR) is the process of recognizing potential cyberthreats and reacting to them before harm can be ...Seecompletedefinition

Dig Deeper on Threats and vulnerabilities

  • dictionary attackBy: GavinWright
  • How to use the John the Ripper password crackerBy: EdMoyle
  • reverse brute-force attackBy: AlexanderGillis
  • rainbow tableBy: AlexanderGillis
What is a brute-force attack? - Definition from TechTarget (2024)
Top Articles
New Zealand's Top 10 KiwiSaver Funds - Canstar
6 Components of Financial Plan you need to know as a freelancer.
Frases para un bendecido domingo: llena tu día con palabras de gratitud y esperanza - Blogfrases
Tryst Utah
Mcgeorge Academic Calendar
Noaa Charleston Wv
Eric Rohan Justin Obituary
Santa Clara Valley Medical Center Medical Records
Mycarolinas Login
Persona 4 Golden Taotie Fusion Calculator
My.doculivery.com/Crowncork
Saberhealth Time Track
Conan Exiles Thrall Master Build: Best Attributes, Armor, Skills, More
Cinebarre Drink Menu
Craftology East Peoria Il
Aucklanders brace for gales, hail, cold temperatures, possible blackouts; snow falls in Chch
Arre St Wv Srj
Find Such That The Following Matrix Is Singular.
Spectrum Field Tech Salary
Harem In Another World F95
Toy Story 3 Animation Screencaps
91 East Freeway Accident Today 2022
Zack Fairhurst Snapchat
Allybearloves
Adt Residential Sales Representative Salary
Www.craigslist.com Savannah Ga
Egizi Funeral Home Turnersville Nj
Wiseloan Login
Amelia Chase Bank Murder
Hesburgh Library Catalog
Criterion Dryer Review
Abga Gestation Calculator
Best Town Hall 11
Orange Park Dog Racing Results
Warn Notice Va
Leland Nc Craigslist
Solve 100000div3= | Microsoft Math Solver
Tra.mypatients Folio
Atlantic Broadband Email Login Pronto
Craigslist West Seneca
19 Best Seafood Restaurants in San Antonio - The Texas Tasty
Hindilinks4U Bollywood Action Movies
Walgreens Agrees to Pay $106.8M to Resolve Allegations It Billed the Government for Prescriptions Never Dispensed
Conan Exiles Armor Flexibility Kit
Fedex Passport Locations Near Me
فیلم گارد ساحلی زیرنویس فارسی بدون سانسور تاینی موویز
BCLJ July 19 2019 HTML Shawn Day Andrea Day Butler Pa Divorce
Reli Stocktwits
Www Pig11 Net
CPM Homework Help
4015 Ballinger Rd Martinsville In 46151
Latest Posts
Article information

Author: Jerrold Considine

Last Updated:

Views: 6220

Rating: 4.8 / 5 (78 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Jerrold Considine

Birthday: 1993-11-03

Address: Suite 447 3463 Marybelle Circles, New Marlin, AL 20765

Phone: +5816749283868

Job: Sales Executive

Hobby: Air sports, Sand art, Electronics, LARPing, Baseball, Book restoration, Puzzles

Introduction: My name is Jerrold Considine, I am a combative, cheerful, encouraging, happy, enthusiastic, funny, kind person who loves writing and wants to share my knowledge and understanding with you.