• Skip to main content
  • Skip to primary sidebar

Technipages

Tutorials and fixes for smartphone, gadget, and computer problems

  • Topics
    • Android
    • Browsers
    • Gaming
    • Hardware
    • Internet
    • iPhone
    • Linux
    • macOS
    • Office
    • Reviews
    • Software
    • Windows
    • Definitions
  • Product Reviews
  • Downloads
  • About
What is a Brute-Force Attack?

What is a Brute-Force Attack?

January 2, 2023 by Mel Hawthorne Leave a Comment

There are many extremely technical and sophisticated hacks out there. As you might be able to guess from the name, a brute-force attack, isn’t really all that. That isn’t to say that you should ignore them. As unsophisticated as they are, they can be very effective. Given enough time and processing power, a brute-force attack should always have a 100% success rate.

Sub-classes

There are two main sub-classes: online and offline attacks. An online brute-force attack doesn’t necessarily involve the Internet. Instead, it is a class of attack that directly targets the running system. An offline attack can be performed without needing to interact with the system that’s under attack.

But how can you attack a system without attacking the system? Well, data breaches often contain lists of leaked usernames and passwords. Security advice though, recommends that passwords are stored in a hashed format. These hashes can only be cracked by guessing the right password. Unfortunately, now that the list of hashes is publicly available, an attacker can just download the list and try to crack them on their own computer. With enough time and processing power, this lets them know a list of valid usernames and passwords with 100% certainty before ever connecting to the affected site.

An online attack in comparison would try logging into the website directly. Not only is this a lot slower, but it’s also noticeable by pretty much any system owner that cares to look. As such, offline brute-force attacks are typically preferred by attackers. Sometimes, however, they may not be possible.

Brute-forcing credentials

The easiest class to understand and the most common threat is brute-forcing login details. In this scenario, an attacker literally tries as many combinations of usernames and passwords as possible to see what works. As covered above, in an online brute-force attack, the attacker may simply try entering as many combinations of username and password into the login form. This sort of attack generates a lot of traffic and failed login attempt errors which may be noticed by a system administrator who then may take action to block the attacker.

An offline brute-force attack revolves around cracking password hashes. This process literally takes the form of guessing every possible combination of characters. Given enough time and processing power, it would successfully crack any password using any hashing scheme. Modern hashing schemes designed for password hashing, however, have been designed to be “slow” and are typically tuned to take tens of milliseconds. This means that even with a huge amount of processing power, it will take many billions of years to crack a decently long password.

To try to increase the odds of cracking most passwords, hackers tend to use dictionary attacks instead. This involves trying a list of commonly used or previously cracked passwords to see if any in the current set have already been seen. Despite security advice to use unique, long, and complex passwords for everything, this strategy of a dictionary attack is typically very successful cracking roughly 75-95% of passwords. This strategy still takes lots of processing power and is still a type of brute-force attack, it’s just slightly more targeted than a standard brute-force attack.

Other types of brute-force attack

There are many other ways to use brute-force. Some attacks involve trying to gain physical access to a device or system. Typically an attacker will try to be stealthy about it. For example, they may try to stealthily pick-pocket a phone, they may try to pick a lock, or they may tailgate through an access-controlled door. Brute-force alternatives to these tend to be very literal, using actual physical force.

In some cases, some of a secret may be known. A brute-force attack can be used to guess the rest of it. For example, a few digits of your credit card number are often printed on receipts. An attacker could try all possible combinations of other numbers to work out your full card number. This is why most numbers are blanked out. The last four digits, for example, are enough to identify your card, but not enough for an attacker to have a decent chance of guessing the rest of the card number.

DDOS attacks are a type of brute-force attack. They aim to overwhelm the targeted system’s resources. It doesn’t really matter which resource. it could be CPU power, network bandwidth, or reaching a cloud processing price cap. DDOS attacks literally just involve sending enough network traffic to overwhelm the victim. It doesn’t actually “hack” anything.

Conclusion

A brute-force attack is a type of attack that involves relying on sheer luck, time, and effort. There are plenty of different types of brute-force attack. While some of them can involve somewhat sophisticated tools to carry out such as password-cracking software, the attack itself is not sophisticated. This does not mean that brute-force attacks are paper tigers though, as the concept can be very effective.

You Might Also Like

  • What is a DDOS Attack?
    What is a DDOS Attack?
  • What is a Dictionary Attack?
    What is a Dictionary Attack?
  • How Do I Force Restart Galaxy Tab S8
    How Do I Force Restart Galaxy Tab S8
  • MacOS: Force Quit Apps
    MacOS: Force Quit Apps
  • How Do I Force Restart my Galaxy Z Fold 4
    How Do I Force Restart my Galaxy Z Fold 4
  • Excel: Force "Open as Read Only" Prompt
    Excel: Force "Open as Read Only" Prompt

Filed Under: Hardware

Reader Interactions

Did this help? Let us know!

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

Recent Posts

  • 15 Best iOS 16 Beta 3 Features You Should Try Now
  • Android: How to Record and Add Custom Alarm Audio
  • What is a Hackathon?
  • How to Enable Samsung Adapt Sound for the Best Audio
  • What is Social Engineering?
  • Google Voice Typing Not Working: Fix
  • How to Combine Two Columns in Excel: 5 Best Methods
  • Google Docs: How to Type Faster With Speech-to-Text

Who’s Behind Technipages?

Baby and Daddy My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

© Copyright 2023 Guiding Tech Media · All Rights Reserved · Privacy