290 likes | 819 Views
In this presentation on what is brute force attack is, we learn to crack passwords using brute force attack. The basics of how a brute force attack operates are explained, after which we take a step-by-step approach to how the attack is done. We read about the harmful implications of a brute force attack and also learn some ways how we can protect our credentials against such attacks. Finally, we have a demo where we use penetration testing tools like Airgeddon to hack into a wireless router using a handshake capture file.
E N D
With repeated attempts, a password or credential can be guessed and the system easily compromised even with the most private computers. Even secured systems run the risk of getting brute-forced given enough time. F 4 1 @ G ( 5 V * X % > 5 $ 7 & E 1 M ) ! 7 G [ Hacker
Agenda for the Day • What Is Brute-Force Attack? • How Does Brute-Force Work? • Effects of Brute-Force Attacks • Precautions Against Brute-Force Attack • Live Demo of Brute-Force Mechanism
What Is Brute-Force Attack? • Generating multiple combinations of alphanumeric strings. • Can be used to guess passwords, keys or user credentials. • Has no length constraint or character barriers. • Different from a dictionary attack without a wordlist.
How Does Brute-Force Work? 1 . Choosing a tool that can brute force through credentials and keys John the Ripper Hashcat Hydra
How Does Brute-Force Work? 2. Creating password combinations related to the service being cracked. A 3 % C 3 @ 8 & M X 7 > K 4 D ( ! O T M 3 – 1 U P A S S W D * * * * * 5 $ 7 V E 1 J O H N ‘S Hydra S 2 # F 9 F
How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ K 4 D ( ! O P A S S W D J O H N ‘S S 2 # F 9 F 5 $ 7 V E 1 Password : T M 3 – 1 U 8 & M X 7 >
How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router K 4 D ( ! O P A S S W D J O H N ‘S S 2 # F 9 F 5 $ 7 V E 1 Password : A 3 % C 3 @ T M 3 – 1 U 8 & M X 7 >
How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router K 4 D ( ! O A 3 % C 3 @ P A S S W D J O H N ‘S S 2 # F 9 F 5 $ 7 V E 1 Password : T M 3 – 1 U 8 & M X 7 >
How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ P A S S W D J O H N ‘S S 2 # F 9 F 5 $ 7 V E 1 Password : K 4 D ( ! O T M 3 – 1 U 8 & M X 7 >
How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ P A S S W D K 4 D ( ! O J O H N ‘S S 2 # F 9 F 5 $ 7 V E 1 Password : T M 3 – 1 U 8 & M X 7 >
How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ K 4 D ( ! O J O H N ‘S S 2 # F 9 F 5 $ 7 V E 1 Password : P A S S W D T M 3 – 1 U 8 & M X 7 >
How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ K 4 D ( ! O J O H N ‘S P A S S W D S 2 # F 9 F 5 $ 7 V E 1 Password : T M 3 – 1 U 8 & M X 7 >
How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ K 4 D ( ! O P A S S W D S 2 # F 9 F 5 $ 7 V E 1 Password : J O H N ‘S T M 3 – 1 U 8 & M X 7 >
How Does Brute-Force Work? 3. Trying to run each password through the service/file for testing. Wi-Fi Router A 3 % C 3 @ K 4 D ( ! O P A S S W D S 2 # F 9 F 5 $ 7 V E 1 Password : J O H N ‘S T M 3 – 1 U 8 & M X 7 >
Which password among the ones listed below is the most resistant to Brute-Force attacks? • qwerty • Password123 • MX2%S>8@L • H3!!0@1291
Effects of Brute-Force Attack • Access to personal laptop/mobiles • Malware infusion and ransomware attacks • Theft of personal data for nefarious purposes • Distributing spam with hacked machines
Precautions Against Brute-Force Attack • Complex alphanumeric passwords • Using Two-Factor-Authentication (2FA) • Captcha during login action • Limited no. of login attempts