Password Attacks (TBC)
Introduction
The most common and widely used authentication method is still the use of passwords.
A password or passphrase can be generally defined as a combination of letters, numbers, and symbols in a string for identity validation.
Every application that supports authentication compares provided credentials against either local or remote databases. For example in Linux, user passwords are stored in an encrypted form within the
/etc/shadow
file. The Windows authentication process is more complex and involves several components working together to verify user credentials. Yet, there are still files where we can access encrypted passwords like, SAM%SystemRoot%\system32\config\SAM
Attacking Methods
Dictionary Attacks: Dictionary attacks involve using a pre-generated list of words and phrases (known as a dictionary) to attempt to crack a password.
Brute force Attacks: Brute force attacks involve attempting every conceivable combination of characters that could form a password.
Rainbow Table Attacks: Rainbow table attacks involve using a pre-computed table of hashes and their corresponding plaintext passwords.
Last updated