What is a brute-force attack? - Definition from TechTarget (2024)

What is a brute-force attack? - Definition from TechTarget (1)

By

  • Katie Terrell Hanna

What is a brute-force attack?

A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems. Using brute force is an exhaustive effort rather than employing intellectual strategies.

Just as a criminal might break into and crack a safe by trying many possible combinations, a brute-force attack of applications tries all possible combinations of legal characters in a sequence. Cybercriminals typically use a brute-force attack to obtain access to a website, account or network. They may then install malware, shut down web applications or conduct data breaches.

A simple brute-force attack commonly uses automated tools to guess all possible passwords until the correct input is identified. This is an old but still effective attack method for cracking common passwords.

How long a brute-force attack lasts can vary. Brute-forcing can break weak passwords in a matter of seconds. Strong passwords can typically take hours or days.

Organizations can use complex password combinations to extend the attack time, buying time to respond to and thwart the cyber attack.

What are the different types of brute-force attacks?

Different types of brute-force attacks exist, such as the following:

  • Credential stuffing occurs after a user account has been compromised and the attacker tries the username and password combination across multiple systems.
  • A reverse brute-force attack begins with the attacker using a common password -- or already knowing a password -- against multiple usernames or encrypted files to gain network and data access. The hacker will then follow the same algorithm as a typical brute-force attack to find the correct username.
  • A dictionary attack is another type of brute-force attack, where all words in a dictionary are tested to find a password. Attackers can augment words with numbers, characters and more to crack longer passwords.

Additional forms of brute-force attacks might try and use the most commonly used passwords, such as "password," "12345678" -- or any numerical sequence like this -- and "qwerty," before trying other passwords.

What is the best way to protect against brute-force attacks?

Organizations can strengthen cybersecurity against brute-force attacks by using a combination strategies, including the following:

  • Increasing password complexity. This extends the time required to decrypt a password. Implement password manager rules, like minimum passphrase length, compulsory use of special characters, etc.
  • Limiting failed login attempts. Protect systems and networks by implementing rules that lock a user out for a specified amount of time after repeat login attempts.
  • Encrypting and hashing. 256-bit encryption and password hashes exponentially increase the time and computing power required for a brute-force attack. In password hashing, strings are stored in a separate database and hashed so the same password combinations have a different hash value.
  • Implementing CAPTCHAs. These prevent the use of brute-force attacking tools, like John the Ripper, while still keeping networks, systems and websites accessible for humans.
  • Enacting two-factor authentication. This is a type of multifactor authentication that adds an additional layer of login security by requiring two forms of authentication -- as an example, to sign in to a new Apple device, users need to put in their Apple ID along with a six-digit code that is displayed on another one of their devices previously marked as trusted.

A good way to secure against brute-force attacks is to use all or a combination of the above strategies.

What is a brute-force attack? - Definition from TechTarget (2)

How can brute-force attack tools improve cybersecurity?

Brute-force attack tools are sometimes used to test network security. Some common ones are the following:

  • Aircrack-ng can be used to test Windows, iOS, Linux and Android. It uses a collection of widely used passwords to attack wireless networks.
  • Hashcat can be used to strength test Windows, Linux and iOS from brute-force and rule-based attacks.
  • L0phtCrack is used to test Windows system vulnerabilities against rainbow table attacks. No longer supported, new owners -- as of summer 2021 -- are exploring open sourcing, among other unnamed options for the software.
  • John the Ripper is a free, open source tool for implementing brute-force and dictionary attacks. It is often used by organizations to detect weak passwords and improve network security.

What is a brute-force attack? - Definition from TechTarget (3)IT can use the wireless network auditing tool Aircrack-ng to test password security.

What are examples of brute-force attacks?

  • In 2009, Attackers targeted Yahoo accounts using automated password cracking scripts on a Yahoo web services-based authentication application thought to be used by internet service providers and third-party web applications.
  • In 2015, threat actors breached nearly 20,000 accounts by making millions of automated brute-force attempts to access Dunkin's mobile app rewards program for DD Perks.
  • In 2017, cybersecurity criminals used brute-force attacks to access the U.K. and Scottish Parliament internal networks.
  • In 2018, brute-force attackers cracked passwords and sensitive information of millions of Cathay Pacific airline passengers.
  • In 2018, it became known that a Firefox bug exposed the browser's master password to brute-force attacks against insufficient Secure Hash Algorithm 1 hashing left unfixed for almost nine years.
  • In 2021, the National Security Agency warned of brute-force password attacks being launched from a specially crafted Kubernetes cluster by a unit within Russia's foreign intelligence agency.
  • In 2021, hackers gained access to T-Mobile testing environments and then used brute-force attacks and other means to hack into other IT servers, including those that contained customer data.

This was last updated in September 2021

Continue Reading About brute-force attack

  • How to use hashcat to address authentication vulnerabilities
  • What is a password spraying attack and how does it work?
  • The top 6 SSH risks and how regular assessments cut danger
  • Create and enforce a password policy across the enterprise

Related Terms

What is cloud detection and response (CDR)?
Cloud computing requires a security approach that is different than traditional protections. Where does cloud detection and ...Seecompletedefinition
What is cybercrime and how can you prevent it?
Cybercrime is any criminal activity that involves a computer, network or networked device.Seecompletedefinition
What is threat detection and response (TDR)? Complete guide
Threat detection and response (TDR) is the process of recognizing potential cyberthreats and reacting to them before harm can be ...Seecompletedefinition

Dig Deeper on Threats and vulnerabilities

  • dictionary attackBy: GavinWright
  • How to use the John the Ripper password crackerBy: EdMoyle
  • reverse brute-force attackBy: AlexanderGillis
  • rainbow tableBy: AlexanderGillis
What is a brute-force attack? - Definition from TechTarget (2024)
Top Articles
Start Application
Disclosure Effectiveness: Practical Tips from Researchers and the FTC
Mickey Moniak Walk Up Song
Camera instructions (NEW)
Form V/Legends
Chelsea player who left on a free is now worth more than Palmer & Caicedo
Recent Obituaries Patriot Ledger
Wausau Marketplace
Www Craigslist Louisville
Directions To Lubbock
Optum Medicare Support
Citymd West 146Th Urgent Care - Nyc Photos
What Time Chase Close Saturday
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Premier Reward Token Rs3
Eka Vore Portal
2016 Ford Fusion Belt Diagram
Uc Santa Cruz Events
Dr. med. Uta Krieg-Oehme - Lesen Sie Erfahrungsberichte und vereinbaren Sie einen Termin
Grayling Purnell Net Worth
Hollywood Bowl Section H
Richland Ecampus
Ice Dodo Unblocked 76
Best Sports Bars In Schaumburg Il
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
55Th And Kedzie Elite Staffing
Star Wars Armada Wikia
Weather October 15
Skepticalpickle Leak
5 Star Rated Nail Salons Near Me
Motor Mounts
Craigslist/Phx
Purdue Timeforge
UPC Code Lookup: Free UPC Code Lookup With Major Retailers
Acuity Eye Group - La Quinta Photos
Gwen Stacy Rule 4
B.k. Miller Chitterlings
Tenant Vs. Occupant: Is There Really A Difference Between Them?
Andhra Jyothi Telugu News Paper
Msnl Seeds
Mandy Rose - WWE News, Rumors, & Updates
Casamba Mobile Login
Giovanna Ewbank Nua
Busted Newspaper Mcpherson Kansas
Comanche Or Crow Crossword Clue
✨ Flysheet for Alpha Wall Tent, Guy Ropes, D-Ring, Metal Runner & Stakes Included for Hunting, Family Camping & Outdoor Activities (12'x14', PE) — 🛍️ The Retail Market
Hawkview Retreat Pa Cost
Gary Vandenheuvel Net Worth
Kate Spade Outlet Altoona
Minterns German Shepherds
Horseneck Beach State Reservation Water Temperature
10 Bedroom Airbnb Kissimmee Fl
Latest Posts
Article information

Author: Jerrold Considine

Last Updated:

Views: 6220

Rating: 4.8 / 5 (78 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Jerrold Considine

Birthday: 1993-11-03

Address: Suite 447 3463 Marybelle Circles, New Marlin, AL 20765

Phone: +5816749283868

Job: Sales Executive

Hobby: Air sports, Sand art, Electronics, LARPing, Baseball, Book restoration, Puzzles

Introduction: My name is Jerrold Considine, I am a combative, cheerful, encouraging, happy, enthusiastic, funny, kind person who loves writing and wants to share my knowledge and understanding with you.