Brute Force Attacks: Password Protection (2024)

What's a Brute Force Attack?

A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly.

These attacks are done by ‘brute force’ meaning they use excessive forceful attempts to try and ‘force’ their way into your private account(s).

This is an old attack method, but it's still effective and popular with hackers. Because depending on the length and complexity of the password, cracking it can take anywhere from a few seconds to many years.

What do hackers gain from Brute Force Attacks?

Brute force attackers have to put in a bit of effort to make these schemes pay off. While technology does make it easier, you might still question: why would someone do this?

Here’s how hackers benefit from brute force attacks:

  • Profiting from ads or collecting activity data
  • Stealing personal data and valuables
  • Spreading malware to cause disruptions
  • Hijacking your system for malicious activity
  • Ruining a website’s reputation

Profiting from ads or collecting activity data.

Hackers can exploit a website alongside others to earn advertising commissions. Popular ways to do this include:

  • Putting spam ads on a well-traveled site to make money each time an ad is clicked or viewed by visitors.
  • Rerouting a website’s traffic to commissioned ad sites.
  • Infecting a site or its visitors with activity-tracking malware — commonly spyware. Data is sold to advertisers without your consent to help them improve their marketing.

Stealing personal data and valuables.

Breaking into online accounts can be like cracking open a bank vault: everything from bank accounts to tax information can be found online. All it takes is the right break-in for a criminal to steal your identity, money, or sell your private credentials for profit. Sometimes, sensitive databases from entire organizations can be exposed in corporate-level data breaches.

Spreading malware to cause disruptions for the sake of it.

If a hacker wants to cause trouble or practice their skills, they might redirect a website’s traffic to malicious sites. Alternatively, they may directly infect a site with concealed malware to be installed on visitor’s computers.

Hijacking your system for malicious activity.

When one machine isn’t enough, hackers enlist an army of unsuspecting devices called a botnet to speed up their efforts. Malware can infiltrate your computer, mobile device, or online accounts for spam phishing, enhanced brute force attacks and more. If you don’t have an antivirus system, you may be more at risk of infection.

Ruining a website’s reputation.

If you run a website and become a target of vandalism, a cybercriminal might decide to infest your site with obscene content. This might include text, images, and audio of a violent, p*rnographic, or racially offensive nature.

Types of Brute Force Attacks

Each brute force attack can use different methods to uncover your sensitive data. You might be exposed to any of the following popular brute force methods:

  • Simple Brute Force Attacks
  • Dictionary Attacks
  • Hybrid Brute Force Attacks
  • Reverse Brute Force Attacks
  • Credential Stuffing

Simple brute force attacks: hackers attempt to logically guess your credentials — completely unassisted from software tools or other means. These can reveal extremely simple passwords and PINs. For example, a password that is set as “guest12345”.

Dictionary attacks: in a standard attack, a hacker chooses a target and runs possible passwords against that username. These are known as dictionary attacks. Dictionary attacks are the most basic tool in brute force attacks. While not necessarily being brute force attacks in themselves, these are often used as an important component for password cracking. Some hackers run through unabridged dictionaries and augment words with special characters and numerals or use special dictionaries of words, but this type of sequential attack is cumbersome.

Hybrid brute force attacks: these hackers blend outside means with their logical guesses to attempt a break-in. A hybrid attack usually mixes dictionary and brute force attacks. These attacks are used to figure out combo passwords that mix common words with random characters. A brute force attack example of this nature would include passwords such as NewYork1993 or Spike1234.

Reverse brute force attacks: just as the name implies, a reverse brute force attack reverses the attack strategy by starting with a known password. Then hackers search millions of usernames until they find a match. Many of these criminals start with leaked passwords that are available online from existing data breaches.

Credential stuffing: if a hacker has a username-password combo that works for one website, they’ll try it in tons of others as well. Since users have been known to reuse login info across many websites, they are the exclusive targets of an attack like this.

Tools Aid Brute Force Attempts

Guessing a password for a particular user or site can take a long time, so hackers have developed tools to do the job faster.

Automated tools help with brute force attacks. These use rapid-fire guessing that is built to create every possible password and attempt to use them. Brute force hacking software can find a single dictionary word password within one second.

Tools like these have workarounds programmed in them to:

  • Work against many computer protocols (like FTP, MySQL, SMPT, and Telnet)
  • Allow hackers to crack wireless modems.
  • Identify weak passwords
  • Decrypt passwords in encrypted storage.
  • Translate words into leetspeak — "don'thackme" becomes "d0n7H4cKm3," for example.
  • Run all possible combinations of characters.
  • Operate dictionary attacks.

Some tools scan pre-compute rainbow tables for the inputs and outputs of known hash functions. These “hash functions” are the algorithm-based encryption methods used to translate passwords into long, fixed-length series of letters and numerals. In other words, rainbow tables remove the hardest part of brute force attacking to speed up the process.

GPU Speeds Brute Force Attempts

Tons of computer brainpower is needed to run brute force password software. Unfortunately, hackers have worked out hardware solutions to make this part of the job a lot easier.

Combining the CPU and graphics processing unit (GPU) accelerates computing power. By adding the thousands of computing cores in the GPU for processing, this enables the system to handle multiple tasks at once. GPU processing is used for analytics, engineering, and other computing-intensive applications. Hackers using this method can crack passwords about 250 times faster than a CPU alone.

So, how long would it take to crack a password? To put it in perspective, a six-character password that includes numbers has approximately 2 billion possible combinations. Cracking it with a powerful CPU that tries 30 passwords per second takes more than two years. Adding a single, powerful GPU card lets the same computer test 7,100 passwords per second and crack the password in 3.5 days.

Steps to Protect Passwords for Professionals

To keep yourself and your network safe, you'll want to take your precautions and help others do so as well. User behavior and network security systems will both need reinforcement.

For IT specialists and users alike, you’ll want to take a few general pieces of advice to heart:

  • Use an advanced username and password. Protect yourself with credentials that are stronger than admin and password1234 to keep out these attackers. The stronger this combination is, the harder it will be for anyone to penetrate it.
  • Remove any unused accounts with high-level permissions. These are the cyber equivalent of doors with weak locks that make breaking in easy. Unmaintained accounts are a vulnerability you can’t risk. Throw them away as soon as possible.

Once you’ve got the basics down, you’ll want to bolster your security and get users on board.

We’ll begin with what you can do on the backend, then give tips to support safe habits.

Passive Backend Protections for Passwords

High encryption rates: to make it harder for brute force attacks to succeed, system administrators should ensure that passwords for their systems are encrypted with the highest encryption rates possible, such as 256-bit encryption. The more bits in the encryption scheme, the harder the password is to crack.

Salt the hash: administrators should also randomize password hashes by adding a random string of letters and numbers (called salt) to the password itself. This string should be stored in a separate database and retrieved and added to the password before it's hashed. By salting the hash, users with the same password have different hashes.

Two-factor authentication (2FA): additionally, administrators can require two-step authentication and install an intrusion detection system that detects brute force attacks. This requires users to follow-up a login attempt with a second factor, like a physical USB key or fingerprint biometrics scan.

Limit number of login re-tries: limiting the number of attempts also reduces susceptibility to brute-force attacks. For example, allowing three attempts to enter the correct password before locking out the user for several minutes can cause significant delays and cause hackers to move on to easier targets.

Account lockdown after excessive login attempts: if a hacker can endlessly keep retrying passwords even after a temporary lockout, they can return to try again. Locking the account and requiring the user to contact IT for an unlock will deter this activity. Short lockout timers are more convenient for users, but convenience can be a vulnerability. To balance this, you might consider using the long-term lockdown if there are excessive failed logins after the short one.

Throttle rate of repeated logins: you can further slow an attacker’s efforts by creating space between each single login attempt. Once a login fails, a timer can deny login until a short amount of time has passed. This will leave lag-time for your real-time monitoring team to spot and work on stopping this threat. Some hackers might stop trying if the wait is not worth it.

Required Captcha after repeated login attempts: manual verification does stop robots from brute-forcing their way into your data. Captcha comes in many types, including retyping the text in an image, checking a checkbox, or identifying objects in pictures. Regardless of what you use, you can use this before the first login and after each failed attempt to protect further.

Use an IP denylist to block known attackers. Be sure that this list is constantly updated by those who manage it.

Active IT Support Protections for Passwords

Password education: user behavior is essential to password security. Educate users on safe practices and tools to help them keep track of their passwords. Services like Kaspersky Password Manager allow users to save their complex, hard-to-remember passwords in an encrypted “vault” instead of unsafely writing them down on sticky notes. Since users tend to compromise their safety for the sake of convenience, be sure to help them put convenient tools in their hands that will keep them safe.

Watch accounts in real-time for strange activity: Odd login locations, excessive login attempts etc. Work to find trends in unusual activity and take measures to block any potential attackers in real-time. Look out for IP address blocks, account lockdown, and contact users to determine if account activity is legitimate (if it looks suspicious).

How Users Can Strengthen Passwords Against Brute Force Attacks

As a user, you can do a lot to support your protection in the digital world. The best defense against password attacks is ensuring that your passwords are as strong as they can be.

Brute force attacks rely on time to crack your password. So, your goal is to make sure your password slows down these attacks as much as possible, because if it takes too long for the breach to be worthwhile… most hackers will give up and move on.

Here are a few ways you can strength passwords against brute attacks:

Longer passwords with varied character types. When possible, users should choose 10-character passwords that include symbols or numerals. Doing so creates 171.3 quintillion (1.71 x 1020) possibilities. Using a GPU processor that tries 10.3 billion hashes per second, cracking the password would take approximately 526 years. Although, a supercomputer could crack it within a few weeks. By this logic, including more characters makes your password even harder to solve.

Elaborate passphrases. Not all sites accept such long passwords, which means you should choose complex passphrases rather than single words. Dictionary attacks are built specifically for single word phrases and make a breach nearly effortless. Passphrases — passwords composed of multiple words or segments — should be sprinkled with extra characters and special character types.

Create rules for building your passwords. The best passwords are those you can remember but won’t make sense to anyone else reading them. When taking the passphrase route, consider using truncated words, like replacing “wood” with “wd” to create a string that makes sense only to you. Other examples might include dropping vowels or using only the first two letters of each word.

Stay away from frequently used passwords. It's important to avoid the most common passwords and to change them frequently.

Use unique passwords for every site you use. To avoid being a victim of credential stuffing, you should never reuse a password. If you want to take your security up a notch, use a different username for every site as well. You can keep other accounts from getting compromised if one of yours is breached.

Use a password manager. Installing a password manager automates creating and keeping track of your online login info. These allow you to access all your accounts by first logging into the password manager. You can then create extremely long and complex passwords for all the sites you visit, store them safely, and you only have to remember the one primary password.

If you’re wondering, “how long would my password take to crack,” you can test passphrase strength at https://password.kaspersky.com.

Kaspersky Internet Security received two AV-TEST awards for the best performance & protection for an internet security product in 2021. In all tests Kaspersky Internet Security showed outstanding performance and protection against cyberthreats.

Related articles:

  • What is Adware?
  • What is a Trojan?
  • Computer Viruses and Malware Facts and FAQ
  • Spam and Phishing
Brute Force Attacks: Password Protection (2024)

FAQs

Brute Force Attacks: Password Protection? ›

Use stronger password practices

What is the most common password list for brute force? ›

If any of yours are included, it might be time to think about changing them.
  • 123123.
  • 111111.
  • Password.
  • 12345678910.
  • 000000.
  • Admin123.
  • ********
  • user.
Jul 15, 2024

What is the simplest way to protect against brute force password attacks? ›

The most obvious way to block brute-force attacks is to simply lock out accounts after a defined number of incorrect password attempts. Account lockouts can last a specific duration, such as one hour, or the accounts could remain locked until manually unlocked by an administrator.

How common are brute force password attacks? ›

5% of all data breaches are caused by brute force attacks. Of breaches caused by hacking, 80% involve brute force or lost/stolen credentials.

Do brute force attacks still work? ›

A brute force attack is a relatively old technique from threat actors and cyberattackers — but today it is widely used and remains highly effective.

What is the most hacked password? ›

The Most Hacked Passwords In The USA In 2024
  • password.
  • 123456.
  • qwerty.
  • 12345678.
  • 654321.
  • 111111.
  • password123.
  • 1234567890.

What are the top 7 passwords? ›

The top 10 most common passwords list in 2024:
  • 123456.
  • 123456789.
  • qwerty.
  • password.
  • 12345.
  • qwerty123.
  • 1q2w3e.
  • 12345678.
Nov 27, 2023

How long can a password be against brute force? ›

How Long It Takes to Crack a Password with Brute Force Algorithm
8 characters password12 characters password
Lowercase letters onlyinstantlyseveral weeks
+ 1 uppercase letterhalf an hour5 years
+ 1 numberone hour2 thousand years
+ 1 special symbolone day63 thousand years

What is the best encryption for brute force attacks? ›

256-bit encryption makes data protection even stronger, to the point that even a powerful computer that can check trillions of combinations every second would never crack it. This makes 256-bit encryption completely immune to brute force attacks.

What is the best defense against password attacks? ›

Strategies for Reducing the Risk of a Password Attack
  1. Pen Test. ...
  2. Use Multi-Factor Authentication (MFA) ...
  3. Enforce and Manage Strong Passwords. ...
  4. Monitor Activity. ...
  5. Layered Defense for a Strong Security Posture. ...
  6. Consistent Trainings and Reviews.

How long will it take to brute force your password? ›

About 5% can be guessed within a day, but 85% of this type of passwords take more than a year to work out. The crack time depends on the length: a password of nine characters can be guessed within a year, but one that contains 10 characters, more than a year.

What password requirement will have the highest impact in preventing brute force attacks? ›

The most common combination is a password and a one-time password received on a personal device. 2FA is a strong defense against brute force attacks because, besides guessing a user's credentials, an attacker would need access to a second factor, such as a smartphone or email, to gain access.

Which two security measures can help block password brute force attacks? ›

How to prevent brute force attacks
  • 1 - Use Strong Passwords. Brute force relies on weak passwords. ...
  • 2 - Restrict Access to Authentication URLs. A requirement for brute force attacks is to send credentials. ...
  • 3 - Limit Login Attempts. ...
  • 4 - Use CAPTCHAs. ...
  • 5 - Use Two-Factor Authentication (2FA) ...
  • 6 - Set Up IP Access Restrictions.

Are brute force attacks illegal? ›

Because they involve unauthorized access to personal data, brute force attacks are almost always illegal. The only occasion where this attack type would be legal is during system security checks.

Why are brute force attacks always successful? ›

Brute force attacks are a common and persistent threat in the world of cybersecurity. These attacks rely on relentless trial and error to crack passwords or encryption keys, using sheer computing power to systematically try every possible combination until the correct one is found.

Does MFA stop brute force attacks? ›

Brute Force Attacks

An attacker may manage to find a working username and password with a brute force, reverse brute force attack, or dictionary attack. However, they don't know or have the other authentication factors required by the MFA system, so they cannot access the system.

What are the passwords in brute-force? ›

A brute force attack is a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys. It is a simple yet reliable tactic for gaining unauthorized access to individual accounts and organizations' systems and networks.

What are the top 100 passwords? ›

Passwords
  • 123456.
  • password.
  • 12345678.
  • qwerty.
  • 123456789.
  • 12345.
  • 1234.
  • 111111.

What is the largest password list ever recorded? ›

The world's largest compilation of passwords to be leaked online has been discovered by a research team at Cybernews, containing 9,948,575,739 unique plaintext entries. The credentials were discovered in a file named “rockyou2024. txt” that was posted on a popular hacking forum on July 4, 2024.

What is the 10 billion password database? ›

Researchers at Cybernews said they discovered the file, posted on July 4, with 9,948,575,739 unique plaintext passwords. Cybernews experts said they believe this data dump, called RockYou2024, is the largest password leak of all time.

Top Articles
6 Most Crypto-Friendly Banks In Canada (Feb 2024) + $50 Bonus | Yore Oyster
How Do I Contact Instagram?
Walgreens Harry Edgemoor
Calvert Er Wait Time
Oldgamesshelf
Tryst Utah
Brady Hughes Justified
The UPS Store | Ship & Print Here > 400 West Broadway
Winston Salem Nc Craigslist
Blackstone Launchpad Ucf
South Carolina defeats Caitlin Clark and Iowa to win national championship and complete perfect season
Encore Atlanta Cheer Competition
Best Theia Builds (Talent | Skill Order | Pairing + Pets) In Call of Dragons - AllClash
The Haunted Drury Hotels of San Antonio’s Riverwalk
Does Publix Have Sephora Gift Cards
Caresha Please Discount Code
Does Breckie Hill Have An Only Fans – Repeat Replay
Northeastern Nupath
Craigslist Missoula Atv
Samantha Aufderheide
Big Lots Weekly Advertisem*nt
Gazette Obituary Colorado Springs
Bethel Eportal
Xfinity Cup Race Today
Www.craigslist.com Austin Tx
Bocca Richboro
Elbert County Swap Shop
Inkwell, pen rests and nib boxes made of pewter, glass and porcelain.
Local Collector Buying Old Motorcycles Z1 KZ900 KZ 900 KZ1000 Kawasaki - wanted - by dealer - sale - craigslist
Yale College Confidential 2027
Unity Webgl Car Tag
Obituaries, 2001 | El Paso County, TXGenWeb
Log in to your MyChart account
Play It Again Sports Forsyth Photos
Martins Point Patient Portal
Bfri Forum
Advance Auto Parts Stock Price | AAP Stock Quote, News, and History | Markets Insider
Nacogdoches, Texas: Step Back in Time in Texas' Oldest Town
KITCHENAID Tilt-Head Stand Mixer Set 4.8L (Blue) + Balmuda The Pot (White) 5KSM175PSEIC | 31.33% Off | Central Online
Pay Entergy Bill
2023 Fantasy Football Draft Guide: Rankings, cheat sheets and analysis
Lake Andes Buy Sell Trade
Craigslist Minneapolis Com
Swoop Amazon S3
Stosh's Kolaches Photos
Deezy Jamaican Food
Killer Intelligence Center Download
Argus Leader Obits Today
Craigslist Marshfield Mo
Compete My Workforce
Latest Posts
Article information

Author: Kimberely Baumbach CPA

Last Updated:

Views: 6641

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Kimberely Baumbach CPA

Birthday: 1996-01-14

Address: 8381 Boyce Course, Imeldachester, ND 74681

Phone: +3571286597580

Job: Product Banking Analyst

Hobby: Cosplaying, Inline skating, Amateur radio, Baton twirling, Mountaineering, Flying, Archery

Introduction: My name is Kimberely Baumbach CPA, I am a gorgeous, bright, charming, encouraging, zealous, lively, good person who loves writing and wants to share my knowledge and understanding with you.