Password Hacking: Tools used for Passwords Hacking and Tips to Setup a Strong Passwords.
Hey Buddy: In today's tutorial, I'll talk about password hacking and password protection. If not everybody then 85% all a password to protect because we all have passwords for emails, facebook, twitter, databases, computer systems, smart phones, smart devices, servers, bank accounts, and virtually everything that we want to protect. In general word, passwords are keywords, pin or anything to get
access into a system or an account.
access into a system or an account.
One of the most common in nowadays is that people tend to set passwords that are so much more easy to remember, such as their nickname, other names, date of birth, names of family members, mobile numbers and so on... But we never knew this is what makes our passwords weak and get very easy to hacking by hackers in the world.
But before I proceed, check out the previous tutorial on Ethical Hacking below :
1st day >> Ethical Hacking Tutorial — Overall Review,
2nd day >> Ethical Hacking Tutorial — Types of Hackers,
3rd day >> Ethical Hacking Tutorial — Top 15 Most Famous Hackers in the Worldwide and How they became Famous,
It is advisable for one not to ever use any of the above mentioned method to set one password, password should be taken care of so as to set a strong password to defend one accounts from potential hackers. Below, you have a guide to setup a strong password and attributes of a strong password −
- A strong password most have at least 8 to 10 characters.
- And most be a mix of letters (small and capital), numbers, and special characters or symbol.
- Example: *QTechPluz_$50 @50QtechpluZ_
- Dictionary Attack: This is an attempt, attack of gaining access to a computer system by using a very large set of words or using words from the dictionary to generate potential passwords. Also in most cases the hacker uses a predefined list of words from a dictionary to try and guess the password. Doing this will help hacking easy, If the set password is weak.
- Hydra: here is an popular tool that is widely and mostly used for dictionary attacks.
- Hybrid Dictionary Attack: Hybrid dictionary attack is use to set of dictionary words combined with extensions. For instance, let assume that the password is set as "alyssa" or "Alyssa" and it mixed with or combine it with number such as "Alyssa123", "alyssa147", "133alyssa" etc...
- Brute-Force Attack: Is used by top hackers in the worldwide, in a brute-force attack, the hacker uses all their possible best and start combining any letters, numbers, special characters, and small and capital letters to break in the system or account password. This type of attack has a high probability of success, but one needs to be more focus because it requires an enormous amount of time to process all the combinations. A brute-force attack is slow and the hacker might require a system with high processing power to perform all those permutations and combinations faster.
- John the Ripper or Johnny: this is one of the most popular and powerful tools to set a brute-force attack and it comes bundled with the Kali distribution of Linux.
Quick Tips to Fix and Keep an Account, System or Database Safe:
- Never write down the passwords anywhere, you just have to memorize them all.
- Always set up a strong passwords that are difficult to crack.
- When setting up a password, always use a combination of alphabets, digits, symbols, and capital and small letters.
- Never set a passwords that are similar to the usernames.
- Never use the same password for all systems or accounts.
Comments
Post a Comment
Please Share Your Thoughts About This Post....