Open In App

What is Password Guessing Attack?

There are a number of methods to crack a user’s password, but the most prominent one is a Password Guessing Attack. Basically, this is a process of attempting to gain the system’s access by trying on all the possible passwords (guessing passwords). If the attacker manages to guess the correct one, he has complete access to the remote system, can manipulate the data, and may demand a ransom in exchange for the system data.

Classification of Password Guessing attack:

Most commonly, these types of attacks are classified into two:



1. Dictionary Attack:

There are a number of most commonly found passwords online in the form of dictionaries. This dictionary consists of a list of passwords leaked in a data breach or commonly used passwords. 

Example: abc123, 123456789, password, abcdef, etc. To learn more, please refer to the article Dictionary Attack.



Prevention:

2. Brute force Attack:

This method includes trying all the possible permutations of passwords until finding the correct one. The time taken depends on the complexity of passwords, weaker passwords can be cracked within a couple of minutes while the stronger ones may take several hours or days.

Generally, these types of attacks may be detected by the system and the account may be locked to prevent unauthorized access due to many failed login attempts, though attackers find ways to bypass the detection and successfully crack the password. To learn more, please refer to the article Brute force attack.

Prevention:

3. Keylogger Attack:

Keyloggers are malicious software made with the purpose to record all the keystrokes of the user and report them back to the hacker. Mostly, the user installs software from unofficial sources believing it to be legitimate, but that software installs keyloggers without the user knowing it. This results in all the keystrokes being recorded and reported to the hacker; in many cases, the hacker is able to guess the password easily. Please refer to the article Keylogger to learn more about this.

Prevention:

4. Man-in-the-middle attack:

Basically, in these types of attacks, the hacker intercepts (or get access to the compromised system) the original connection between the user and Web App/Server and acts as a middleman between the client and the server. In this way, the hacker has access to the information passing between the client and server, including passwords. Please refer to the article Man-in-the-middle attack for more details about this.

 

Prevention:

5. Credential Stuffing Attack:

One day or the other, we all get to know about data breaches of various websites (mostly weak and disrepute). The hacker takes advantage of this. Generally, some people do not frequently change their passwords or if they change, it would be quite similar to the old one, so in times of data breaches, the hackers try to find your records in the breach and attempt to gain access to your account by trying different permutations of the leaked password.

 

Prevention:

Article Tags :