A Dictionary Attack as an attack vector used by the attacker to break in a system, which is password protected, by putting technically every word in a dictionary as a form of password for that system. This attack vector is a form of Brute Force Attack.
The dictionary can contain words from an English dictionary and also some leaked list of commonly used passwords and when combined with common character replacing with numbers, can sometimes be very effective and fast.
How is it done?
Basically, it is trying every single word that is already prepared. It is done using automated tools that try all the possible words in the dictionary.
Some Password Cracking Software:
- John the Ripper
Difference between Brute Force and Dictionary Attack:
The difference with brute force attack is that, in brute force, a large number of possible key permutations are checked whereas, in the dictionary attack, only the words with most possibilities of success are checked and are less time consuming than brute force.
How to be on the safer side?
You can protect yourself from such kind of attacks by following ways:
- Choose a mix of upper and lower case letters, numbers and specials (i.e. special characters).
- Password must be a long string with more characters. The longer it is, the more time consuming it is to crack (sometimes, time to crack is in years).
- Password reset should be done after a certain period of time.
GeeksforGeeks has prepared a complete interview preparation course with premium videos, theory, practice problems, TA support and many more features. Please refer Placement 100 for details
- Difference between Active Attack and Passive Attack
- US Maritime Attack
- What is Zed Attack Proxy?
- Sybil Attack
- Difference between Threat and Attack
- Buffer Overflow Attack with Example
- Birthday attack in Cryptography
- Difference between DOS and DDOS attack
- Brute Force Attack
- Perform DDoS attack using Torshammer
- Zero-day Exploit (Cyber Security Attack)
- Denial of Service DDoS attack
- Wormhole Attack in Wireless Sensor Networks
- Sinkhole Attack in Wireless Sensor Networks
- Ways to place K bishops on an N×N chessboard so that no two attack
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.