Password Cracking Techniques : – We can use phishing and RAT’s to hack password of accounts, pc and smartphones. But there are lots of passwords hacking techniques used by hackers around the world.
We will be learning some best password hacking methods used by hackers and how these methods work. In the end, we will also learn about some password cracking countermeasures, that you can use to make your password even more secure.
Password Cracking Methods
These are some best password hacking techniques used by hackers.
Dictionary method of password hacking is really famous these days.
In this method, hackers make wordlist in a text file with some common passwords, words or list of some guessed passwords.
Then they use any tool to perform this attack using that wordlist. The tool will automatically test every word in wordlist until they found the real password.
Brute Force Attack
Brute force attack is similar to a dictionary attack, but with a difference.
In brute force attack, hackers use a tool which automatically try every combination of words, characters and symbols until they find the real password.
It’s like, first they will try admin1 -> admin2 -> admin3 and this series goes on until they come across the actual password.
Rainbow Tables Attack
Every plain text password is stored in hashes in the computer. Rainbow Table Attack uses a list of pre-computed hashes (and hashes of all possible password combination of any algorithm) and then compare those hashes.
This method takes less time to crack a password.
Another way to hack password is to directly ask for it from the victim? I know it’s stupid. But if you are a regular reader of this site then you already know what I mean.
In a phishing attack, a hacker makes a fake web page and then trick the victim into login on that fake page and when victim logs in, hacker gets the password.
This method is my favorite, all you have to do is to make a phishing page and then trick the user to login by using somethings you already know about them. Besides this, the phishing method is fun for me.
Hackers use keyloggers and screenscrappers to easily get plain text password of anyone from computer or smartphone.
Hackers simply install keylogger program in any computer or smartphone and then keylogger starts its work. It will start recording every keystrock from victim’s computer or phone’s keyboard and in the meantime; it will also capture the password and send the data back to the hacker.
Remember some time ago, I told you about hacking android phone using Spynote and Ahmyth RAT. Keylogger option is available in those RAT programs. You can use them.
On the other hand, screenscrapper programs keep capturing screenshots of victim’s screen and hackers gets them all. Chances are it’ll also capture the password.
Besides this, using screenscrapper just for capturing passwords is not enough use of it, you can also use these kinds of programs for surveillance.
The first step of ethical hacking and is Information Gathering, in which they collect as much information as possible about the target.
Hackers also use this information to guess password. For a normal computer and smartphone victim, who is not so tech-savvy, this technique mostly works.
In Social Engineering, hackers mostly pretend to be a tech support guy and then call or interact with their victim and directly ask them for a password to manage the network or system.
Or they can also ask for some access to specific services or apps, which can be used to hack password.
In shoulder surfing, you need to stand behind the victim while they are entering their password. It could help you in two ways.
Either you will get a password or you will get some information about password which can be used to create a wordlist and perform dictionary or brute force attack.
Password Hacking Countermeasures
The weakest thing in any security system are humans, because anyone can manipulate us and get information related to password or anything.
As Elliot told us in Mr Robot “I have never found it hard to hack most people. If you listen to them, watch them. Their vulnerabilities are like a neon sign screwed into their heads.”
So, it is your responsibility to keep your password safe.
– Don’t use the same password to login on sites or apps you use.
– Make your password combination of uppercase letters, lowercase letters, numbers, and symbols.
– Length of your password should be more than 7 characters.
– Don’t share your password with anyone, even if it’s your family member or girlfriend or ex-girlfriend.
– Double-check if it is a real webpage or site where you are trying to login.
– Don’t save your password in the browser after signing in.
– Clear browser cookies and saved passwords on regular basis.
Friends, of course, we can not stop a hacker? But yeah we can slow them down using above countermeasures and tips.
What is your favorite password hacking technique?. mention in comment. enjoy reading!