SlideShare a Scribd company logo
@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
ATTACK AND ITS TYPES
PASSWORD
Hey Jerry, you know,
the world of cybersecurity can be
pretty fascinating and also a bit scary.
Have you ever wondered how hackers try
to crack passwords and gain unauthorized
access to accounts?
Definitely, Tom! It's quite concerning
how passwords can be vulnerable
to attacks. I've heard there are
different types of password attacks.
Do you know what they are?
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
Absolutely, Jerry! One common type is a
brute force attack, where hackers try
all possible password combinations
until they find the correct one. It can be
time-consuming but can work if the
password is weak or short.
That sounds time-consuming,
indeed. Are there any quicker
methods?
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
Indeed! There are dictionary attacks.
Hackers try common passwords or words
against an account, exploiting people's
tendency to use easily guessable
passwords. That is why one must always
choose strong, unique passwords to
stay secure!
Oh, I see. So, what if the password
isn't easily guessable?
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
Well, hackers sometimes use a technique
called a "rainbow table attack." They have a
precomputed table of password hashes
generated from many possible plaintext
passwords. These tables are created in
advance and can be quite extensive, covering
a wide range of possible passwords.
That's clever! But what if the
hacker doesn't have a precomputed
table?
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
In that case, attackers resort to credential
stuffing attacks. They use lists of
usernames and passwords obtained from
previous data breaches and try those
credentials on other online accounts,
exploiting the fact that people often reuse
passwords across different platforms.
That's alarming. Are there any
other methods?
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
Absolutely, Jerry! Keylogging and
shoulder surfing. Hackers can secretly
record keystrokes, including passwords,
or visually spy on people entering
their passwords.
Wow, those methods are sneaky!
Is there anything else we should be
aware of?
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
There's one more technique to mention
social engineering attacks. Hackers trick
people into sharing passwords through
deception and manipulation, posing as
tech support or using elaborate schemes.
That's quite scary. We need to be more
cautious with our passwords and take
steps to protect ourselves.
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
TIPS FOR
PASSWORD SECURITY
Set Strong Passwords
Use Unique Passwords
Enable Multi-Factor Authentication (MFA)
Utilize Password Managers
Regularly Change Passwords
Educate Users
Encrypt Passwords
Account Lockout Policies
Use HTTPs
Regular Security Updates
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
FOUND THIS USEFUL?
Get More Insights Through Our FREE
Courses | Workshops | eBooks | Checklists | Mock Tests
LIKE SHARE FOLLOW

More Related Content

PPT
CO1-Concept of ethical hacking Explained
PPT
PPT
Hacking
ย 
PPTX
Ethical hacking for Business or Management.pptx
PPTX
Gamifying Ethical hacking for education.pptx
PDF
Why is password protection a fallacy a point of view
PPTX
Ethical hacking
PPTX
Cyber hacking dev days by aes team
CO1-Concept of ethical hacking Explained
Hacking
ย 
Ethical hacking for Business or Management.pptx
Gamifying Ethical hacking for education.pptx
Why is password protection a fallacy a point of view
Ethical hacking
Cyber hacking dev days by aes team

Similar to Password Attack and its Types-1.pdf (20)

PPT
Introduction To Ethical Hacking
PPT
Hacking
PPSX
Information Security and Ethical Hacking
PPTX
Presentation on Ethical Hacking ppt
PPTX
Hackers ethics presentation
PDF
Yours Advance Security Hood (Yash)
PPTX
Jaishreeethicalhackingppt-171011183223.pptx
PPTX
security.pptx
PPTX
HACKING
PPTX
Ethical hacking ppt by shantanu arora
PPTX
Hacking
PPTX
CSSE-Ethical-Hacking-ppt.pptx
PPTX
Summer training in jaipur
PPTX
Hack and Crack Slide
PPTX
Ethical hacking Chapter 1 - Overview.pptx
PPT
Introduction TO Ethical Hacking
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
PDF
Why is password protection a fallacy a point of view
PPTX
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
PDF
Hacking
Introduction To Ethical Hacking
Hacking
Information Security and Ethical Hacking
Presentation on Ethical Hacking ppt
Hackers ethics presentation
Yours Advance Security Hood (Yash)
Jaishreeethicalhackingppt-171011183223.pptx
security.pptx
HACKING
Ethical hacking ppt by shantanu arora
Hacking
CSSE-Ethical-Hacking-ppt.pptx
Summer training in jaipur
Hack and Crack Slide
Ethical hacking Chapter 1 - Overview.pptx
Introduction TO Ethical Hacking
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Why is password protection a fallacy a point of view
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
Hacking
Ad

More from Mansi Kandari (20)

PDF
๐Ÿš€ ๐‡๐จ๐ฐ ๐†๐ž๐ง๐ž๐ซ๐š๐ญ๐ข๐ฏ๐ž ๐€๐ˆ ๐ข๐ฌ ๐“๐ซ๐š๐ง๐ฌ๐Ÿ๐จ๐ซ๐ฆ๐ข๐ง๐  ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ
PDF
๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ ๐’๐œ๐š๐ง๐ง๐ข๐ง๐  ๐“๐จ๐จ๐ฅ๐ฌ
PDF
๐ƒ๐จ ๐˜๐จ๐ฎ ๐Š๐ง๐จ๐ฐ ๐ญ๐ก๐ž ๐‚๐จ๐ซ๐ž ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐จ๐ฅ๐ข๐œ๐ข๐ž๐ฌ ๐“๐ก๐š๐ญ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐˜๐จ๐ฎ๐ซ ๐Ž๐ซ๐ ๐š๐ง๐ข๐ณ๐š๐ญ๐ข๐จ๐ง?
PDF
๐–๐ก๐ข๐œ๐ก ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐‚๐จ๐ง๐ญ๐ซ๐จ๐ฅ ๐Œ๐ž๐œ๐ก๐š๐ง๐ข๐ฌ๐ฆ ๐ข๐ฌ ๐๐ž๐ฌ๐ญ ๐Ÿ๐จ๐ซ ๐ญ๐ก๐ž ๐‚๐ฅ๐จ๐ฎ๐?
PDF
Ready to elevate your cybersecurity career?
PDF
๐Ÿšจ ๐€๐ซ๐ž ๐˜๐จ๐ฎ ๐‘๐ž๐š๐๐ฒ ๐ญ๐จ ๐€๐œ๐ž ๐˜๐จ๐ฎ๐ซ ๐ƒ๐ž๐ฏ๐’๐ž๐œ๐Ž๐ฉ๐ฌ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ? ๐Ÿšจ
PDF
๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐•๐ž๐ง๐๐จ๐ซ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ !
PDF
๐Ÿ๐Ÿ’ ๐Œ๐จ๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฆ๐จ๐ง ๐€๐ญ๐ญ๐š๐œ๐ค๐ฌ ๐จ๐ง ๐–๐ž๐›๐ฌ๐ข๐ญ๐ž๐ฌ: ๐€๐ซ๐ž ๐˜๐จ๐ฎ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ž๐?
PDF
๐€๐ฉ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐‹๐š๐ฒ๐ž๐ซ ๐๐ซ๐จ๐ญ๐จ๐œ๐จ๐ฅ๐ฌ
PDF
๐“๐จ๐ฉ ๐ˆ๐ ๐‚๐จ๐ฆ๐ฆ๐š๐ง๐๐ฌ ๐Ÿ๐จ๐ซ ๐–๐ข๐ง๐๐จ๐ฐ๐ฌ
PDF
๐€๐ฅ๐ข๐ ๐ง๐ข๐ง๐  ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐’๐ญ๐ซ๐š๐ญ๐ž๐ ๐ฒ ๐ฐ๐ข๐ญ๐ก ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐†๐จ๐š๐ฅ๐ฌ: ๐๐ฎ๐ข๐ฅ๐๐ข๐ง๐  ๐’๐ญ๐ซ๐จ๐ง๐ ๐ž๐ซ ๐Ž๐ซ๐ ๐š๐ง๐ข๐ณ๐š๐ญ๐ข๐จ๐ง๐ฌ
PDF
๐ƒ๐ซ๐š๐Ÿ๐ญ ๐ƒ๐๐ƒ๐ ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‘๐ž๐ ๐ฎ๐ฅ๐š๐ญ๐ข๐จ๐ง๐ฌ (๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“)
PDF
๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ: ๐“๐ก๐ž ๐…๐จ๐ฎ๐ง๐๐š๐ญ๐ข๐จ๐ง ๐จ๐Ÿ ๐“๐ซ๐ฎ๐ฌ๐ญ & ๐ˆ๐ง๐ญ๐ž๐ ๐ซ๐ข๐ญ๐ฒ
PDF
๐„๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ข๐ง๐  ๐ญ๐ก๐ž ๐’๐Ž๐‚ ๐‚๐š๐ซ๐ž๐ž๐ซ ๐๐š๐ญ๐ก๐ฐ๐š๐ฒ ๐ข๐ง ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“: ๐˜๐จ๐ฎ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‰๐จ๐ฎ๐ซ๐ง๐ž๐ฒ ๐’๐ญ๐š๐ซ๐ญ๐ฌ ๐‡...
PDF
๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ ๐’๐œ๐š๐ง๐ง๐ข๐ง๐  ๐“๐จ๐จ๐ฅ๐ฌ
PDF
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
PDF
๐“๐จ๐ฉ ๐ƒ๐š๐ญ๐š ๐€๐ง๐จ๐ง๐ฒ๐ฆ๐ข๐ณ๐š๐ญ๐ข๐จ๐ง ๐“๐ž๐œ๐ก๐ง๐ข๐ช๐ฎ๐ž๐ฌ
PDF
๐๐ž๐ฑ๐ญ-๐†๐ž๐ง ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐“๐จ๐จ๐ฅ๐ฌ
PDF
๐”๐ง๐ฅ๐จ๐œ๐ค๐ข๐ง๐  ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐๐จ๐ญ๐ž๐ง๐ญ๐ข๐š๐ฅ ๐ฐ๐ข๐ญ๐ก ๐ˆ๐ง๐ฌ๐ข๐ ๐ก๐ญ๐ฌ-๐š๐ฌ-๐š-๐’๐ž๐ซ๐ฏ๐ข๐œ๐ž!
PDF
๐“๐จ๐ฉ ๐Ÿ๐Ÿ ๐Œ๐ฎ๐ฌ๐ญ-๐Š๐ง๐จ๐ฐ ๐„๐ฏ๐ž๐ง๐ญ ๐ˆ๐ƒ๐ฌ ๐Ÿ๐จ๐ซ ๐˜๐จ๐ฎ๐ซ ๐’๐Ž๐‚ ๐’๐ฎ๐œ๐œ๐ž๐ฌ๐ฌ !
๐Ÿš€ ๐‡๐จ๐ฐ ๐†๐ž๐ง๐ž๐ซ๐š๐ญ๐ข๐ฏ๐ž ๐€๐ˆ ๐ข๐ฌ ๐“๐ซ๐š๐ง๐ฌ๐Ÿ๐จ๐ซ๐ฆ๐ข๐ง๐  ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ
๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ ๐’๐œ๐š๐ง๐ง๐ข๐ง๐  ๐“๐จ๐จ๐ฅ๐ฌ
๐ƒ๐จ ๐˜๐จ๐ฎ ๐Š๐ง๐จ๐ฐ ๐ญ๐ก๐ž ๐‚๐จ๐ซ๐ž ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐จ๐ฅ๐ข๐œ๐ข๐ž๐ฌ ๐“๐ก๐š๐ญ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐˜๐จ๐ฎ๐ซ ๐Ž๐ซ๐ ๐š๐ง๐ข๐ณ๐š๐ญ๐ข๐จ๐ง?
๐–๐ก๐ข๐œ๐ก ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐‚๐จ๐ง๐ญ๐ซ๐จ๐ฅ ๐Œ๐ž๐œ๐ก๐š๐ง๐ข๐ฌ๐ฆ ๐ข๐ฌ ๐๐ž๐ฌ๐ญ ๐Ÿ๐จ๐ซ ๐ญ๐ก๐ž ๐‚๐ฅ๐จ๐ฎ๐?
Ready to elevate your cybersecurity career?
๐Ÿšจ ๐€๐ซ๐ž ๐˜๐จ๐ฎ ๐‘๐ž๐š๐๐ฒ ๐ญ๐จ ๐€๐œ๐ž ๐˜๐จ๐ฎ๐ซ ๐ƒ๐ž๐ฏ๐’๐ž๐œ๐Ž๐ฉ๐ฌ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ? ๐Ÿšจ
๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐•๐ž๐ง๐๐จ๐ซ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ !
๐Ÿ๐Ÿ’ ๐Œ๐จ๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฆ๐จ๐ง ๐€๐ญ๐ญ๐š๐œ๐ค๐ฌ ๐จ๐ง ๐–๐ž๐›๐ฌ๐ข๐ญ๐ž๐ฌ: ๐€๐ซ๐ž ๐˜๐จ๐ฎ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ž๐?
๐€๐ฉ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐‹๐š๐ฒ๐ž๐ซ ๐๐ซ๐จ๐ญ๐จ๐œ๐จ๐ฅ๐ฌ
๐“๐จ๐ฉ ๐ˆ๐ ๐‚๐จ๐ฆ๐ฆ๐š๐ง๐๐ฌ ๐Ÿ๐จ๐ซ ๐–๐ข๐ง๐๐จ๐ฐ๐ฌ
๐€๐ฅ๐ข๐ ๐ง๐ข๐ง๐  ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐’๐ญ๐ซ๐š๐ญ๐ž๐ ๐ฒ ๐ฐ๐ข๐ญ๐ก ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐†๐จ๐š๐ฅ๐ฌ: ๐๐ฎ๐ข๐ฅ๐๐ข๐ง๐  ๐’๐ญ๐ซ๐จ๐ง๐ ๐ž๐ซ ๐Ž๐ซ๐ ๐š๐ง๐ข๐ณ๐š๐ญ๐ข๐จ๐ง๐ฌ
๐ƒ๐ซ๐š๐Ÿ๐ญ ๐ƒ๐๐ƒ๐ ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‘๐ž๐ ๐ฎ๐ฅ๐š๐ญ๐ข๐จ๐ง๐ฌ (๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“)
๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ: ๐“๐ก๐ž ๐…๐จ๐ฎ๐ง๐๐š๐ญ๐ข๐จ๐ง ๐จ๐Ÿ ๐“๐ซ๐ฎ๐ฌ๐ญ & ๐ˆ๐ง๐ญ๐ž๐ ๐ซ๐ข๐ญ๐ฒ
๐„๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ข๐ง๐  ๐ญ๐ก๐ž ๐’๐Ž๐‚ ๐‚๐š๐ซ๐ž๐ž๐ซ ๐๐š๐ญ๐ก๐ฐ๐š๐ฒ ๐ข๐ง ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“: ๐˜๐จ๐ฎ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‰๐จ๐ฎ๐ซ๐ง๐ž๐ฒ ๐’๐ญ๐š๐ซ๐ญ๐ฌ ๐‡...
๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ ๐’๐œ๐š๐ง๐ง๐ข๐ง๐  ๐“๐จ๐จ๐ฅ๐ฌ
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
๐“๐จ๐ฉ ๐ƒ๐š๐ญ๐š ๐€๐ง๐จ๐ง๐ฒ๐ฆ๐ข๐ณ๐š๐ญ๐ข๐จ๐ง ๐“๐ž๐œ๐ก๐ง๐ข๐ช๐ฎ๐ž๐ฌ
๐๐ž๐ฑ๐ญ-๐†๐ž๐ง ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐“๐จ๐จ๐ฅ๐ฌ
๐”๐ง๐ฅ๐จ๐œ๐ค๐ข๐ง๐  ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐๐จ๐ญ๐ž๐ง๐ญ๐ข๐š๐ฅ ๐ฐ๐ข๐ญ๐ก ๐ˆ๐ง๐ฌ๐ข๐ ๐ก๐ญ๐ฌ-๐š๐ฌ-๐š-๐’๐ž๐ซ๐ฏ๐ข๐œ๐ž!
๐“๐จ๐ฉ ๐Ÿ๐Ÿ ๐Œ๐ฎ๐ฌ๐ญ-๐Š๐ง๐จ๐ฐ ๐„๐ฏ๐ž๐ง๐ญ ๐ˆ๐ƒ๐ฌ ๐Ÿ๐จ๐ซ ๐˜๐จ๐ฎ๐ซ ๐’๐Ž๐‚ ๐’๐ฎ๐œ๐œ๐ž๐ฌ๐ฌ !
Ad

Recently uploaded (20)

PPTX
Funds Management Learning Material for Beg
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
simpleintnettestmetiaerl for the simple testint
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPTX
artificialintelligenceai1-copy-210604123353.pptx
ย 
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
PPTX
E -tech empowerment technologies PowerPoint
PPTX
Database Information System - Management Information System
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPT
Ethics in Information System - Management Information System
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Internet Safety for Seniors presentation
PPTX
artificial intelligence overview of it and more
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
ย 
Funds Management Learning Material for Beg
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
simpleintnettestmetiaerl for the simple testint
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
artificialintelligenceai1-copy-210604123353.pptx
ย 
Design_with_Watersergyerge45hrbgre4top (1).ppt
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
E -tech empowerment technologies PowerPoint
Database Information System - Management Information System
250152213-Excitation-SystemWERRT (1).ppt
si manuel quezon at mga nagawa sa bansang pilipinas
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Ethics in Information System - Management Information System
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Layers_of_the_Earth_Grade7.pptx class by
newyork.pptxirantrafgshenepalchinachinane
Internet Safety for Seniors presentation
artificial intelligence overview of it and more
Power Point - Lesson 3_2.pptx grad school presentation
ย 

Password Attack and its Types-1.pdf

  • 2. Hey Jerry, you know, the world of cybersecurity can be pretty fascinating and also a bit scary. Have you ever wondered how hackers try to crack passwords and gain unauthorized access to accounts? Definitely, Tom! It's quite concerning how passwords can be vulnerable to attacks. I've heard there are different types of password attacks. Do you know what they are? @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 3. Absolutely, Jerry! One common type is a brute force attack, where hackers try all possible password combinations until they find the correct one. It can be time-consuming but can work if the password is weak or short. That sounds time-consuming, indeed. Are there any quicker methods? @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 4. Indeed! There are dictionary attacks. Hackers try common passwords or words against an account, exploiting people's tendency to use easily guessable passwords. That is why one must always choose strong, unique passwords to stay secure! Oh, I see. So, what if the password isn't easily guessable? @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 5. Well, hackers sometimes use a technique called a "rainbow table attack." They have a precomputed table of password hashes generated from many possible plaintext passwords. These tables are created in advance and can be quite extensive, covering a wide range of possible passwords. That's clever! But what if the hacker doesn't have a precomputed table? @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 6. In that case, attackers resort to credential stuffing attacks. They use lists of usernames and passwords obtained from previous data breaches and try those credentials on other online accounts, exploiting the fact that people often reuse passwords across different platforms. That's alarming. Are there any other methods? @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 7. Absolutely, Jerry! Keylogging and shoulder surfing. Hackers can secretly record keystrokes, including passwords, or visually spy on people entering their passwords. Wow, those methods are sneaky! Is there anything else we should be aware of? @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 8. There's one more technique to mention social engineering attacks. Hackers trick people into sharing passwords through deception and manipulation, posing as tech support or using elaborate schemes. That's quite scary. We need to be more cautious with our passwords and take steps to protect ourselves. @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 9. TIPS FOR PASSWORD SECURITY Set Strong Passwords Use Unique Passwords Enable Multi-Factor Authentication (MFA) Utilize Password Managers Regularly Change Passwords Educate Users Encrypt Passwords Account Lockout Policies Use HTTPs Regular Security Updates @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 10. FOUND THIS USEFUL? Get More Insights Through Our FREE Courses | Workshops | eBooks | Checklists | Mock Tests LIKE SHARE FOLLOW