Skip to main content

Brute force

Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.

What is the brute force method?

In computer science, brute-force search or exhaustive search, also known as generating and test, is a very general problem-solving technique that consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfies the problem's statement.

What is a Brute-force attack?

Brute-force attack when an attacker uses a set of predefined values to attack a target and analyze the response until he succeeds.
The most common and easiest to understand example of the brute-force attack is the dictionary attack to crack the password. In this, the attacker uses a password dictionary that contains millions of words that can be used as a password. Then the attacker tries these passwords one by one for authentication. If this dictionary contains the correct password, the attacker will succeed.

Popular tools for brute-force attacks

  • Aircrack-ng
  • John the Ripper
  • Rainbow Crack
  • Cain and Abel
  • L0phtCrack
  • Ophcrack
  • Crack
  • Hashcat
  • SAMInside
  • DaveGrohl
  • Ncrack
  • THC Hydra

THC Hydra

  • THC Hydra is a fast network logon password cracking tool. When it is compared with other similar tools, it shows why it is faster. New modules are easy to install in the tool. 
  • You can easily add modules and enhance the features. 
  • It is available for Windows, Linux, Free BSD, Solaris, and OS X.


  • This tool supports various network protocols. Currently, it supports Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP, SOCKS5, SSH (v1 and v2), Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC, and XMPP.

Features of THC Hydra

  1. Fast cracking speed
  2. Available for Windows, Linux, Solaris, and OS X
  3. New modules can be added easily to enhance features
  4. Supportive with Brute force and dictionary attacks

PW dump

  • Pwdump is actually a different Windows programs that are used to provide LM and NTML hashes of system user accounts.
  • Pwdump password cracker is capable of extracting LM, NTLM, and LanMan hashes from the target in Windows, in case if Syskey is disabled, the software has the ability to extract in this condition.
  • Software is updated with an extra feature of password histories display if history is available. Extracted data will be available in a form that is compatible with L0phtcrack.
  • Recently software is updated to a new version called Fgdump as Pwdump not work fine when any antivirus program is running.

Features of Pwdump
  1. Available for Windows XP, 2000
  2. The powerful extra feature is available in a new version of Pwdump
  3. Ability to run multithreaded
  4. It can perform cache dump (Crashed credentials dump) and pstgdump (Protected storage dump).

Conclusion

  • Brute-forcing is the best password cracking methods. The success of the attack depends on various factors.
  • In conclusion, a brute force attack is also known as a dictionary attack that simply means the attack will try every code known in order to crack the system.
  •  In the computer world, this is both good and bad news. Depending on what the cracker is attempting to do. Computer security needs ethical hackers to constantly attempt to crack their systems in order to better secure it.

Comments

Popular posts from this blog

Quenching process

Quenching also called Hardening, is a heat treatment process in which steel is heated up to austenite temperature (above it's critical temperature), hold for some time and then cooled in water, oil or molten salt (rapid cooling). Due to rapid cooling, it results very hard structure - martensite (hardest form of Steel). fig.- steel component quench in oil. Due to hardening process hardness of steel increases and bitterness also increases. (brittleness increases hence hardened Steel nay not directly use). Quenching is always follow by tempering process. Due to rapid cooling in hardening process metal shape shrink, internal residual stresses are setup. That's the reason why hardening is follow by tempering.

Additive Manufacturing processes

  What is Additive Manufacturing? As the name suggests, Additive Manufacturing (also known as 3D printing) is a group of manufacturing techniques , which manufacture parts by adding successive layers of material with the help of computer control systems. Various materials that can be used in additive manufacturing (AM) are plastic, metal, concrete, also human tissue. In the additive manufacturing process, Computer-Aided Design (CAD) is created and utilized to manufacture 3-Dimension (3D) objects. Various CAD-CAM software is required to Design, Analyze, and Manufacture parts. Once CAD data is produced, Slicing software slices the design in different layers (as required by different  AM processes), and then data utilized to manufacture required material parts. Different terms like “3D printing” and “rapid prototyping” are also casually used to describe Additive manufacturing, but each one is a subset of additive manufacturing. Hence in the simple sense, Additive manufacturing technology

Mathematic modeling of polymer extrusion process

  Q-3. Briefly explain the mathematical modelling of any one of the manufacturing processes. Ans:   Mathematical model of polymer extrusion process : Polymer material consists of long chain molecules. In extrusion of thermoplastic polymers, important parameters are Material flow and type of flow Heat transfer in flow Residence time Mixing of particles in flow in multiple polymers, etc. To analyse these parameters, mathematical models are useful. Using governing equations and boundary conditions (B.C), a model is created and a solution is obtained for particular B.C. Governing equations:   To model any flow and thermal transport in the manufacturing process, conservation of mass, conservation of  energy and the force momentum balance equation is used. The equations are as follow, Where, ρ is density,  t is time, T is temperature, V is the velocity vector, μ is dynamic viscosity, F is body force, p is pressure, Cp is specific heat at constant pressure, β is coefficient of volumetric ther