Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,152,351 members, 7,815,716 topics. Date: Thursday, 02 May 2024 at 05:03 PM

Exciting Password Cracking Techniques Used By Hackers - See More At: Http://www. - Webmasters - Nairaland

Nairaland Forum / Science/Technology / Webmasters / Exciting Password Cracking Techniques Used By Hackers - See More At: Http://www. (593 Views)

Apply These 4 Secret Techniques To Improve Your Blog Traffic / Simple Things You Must Understand To Remain An Exciting Profession Blogger / Differences Between Http And Https Websites (2) (3) (4)

(1) (Reply) (Go Down)

Exciting Password Cracking Techniques Used By Hackers - See More At: Http://www. by vicentss(m): 7:12pm On May 27, 2016
Last time we looked at the Excellent Way To Update Android KitKat 4.4.4 To Lollipop Without a PC and I hope it sincerely worked for you, Today we are gonna look at Exciting Password Cracking Techniques Used By Hackers.Using strong password is strongly recommended by cyber security Agencies but unfortunately cyber security doesn’t guide internet users the symbols of Hackers attacks on one's computer. It is useless however strong your passwords, hackers can crack your passwords using various password cracking \techniques, So my dear user if you think that putting using a strong password is the most secure practice to avoid from hacker then you are in the right place. Below are the Exciting Password Cracking Techniques Used by hackers.

1. Brute Force Attack
https://4.bp..com/-ccdxWlKbdR8/V0XUDMHeBII/AAAAAAAABcI/UddrrzeEahcgPnwD0YOlfzj6LbeY1kVRwCLcB/s1600/2.PNG


Brute force attack is a very unique but dangerous passwords cracking Technique, It will try by all means and all possible alpha-numerical combinations until the victim's password is found, Fortunately or perhaps unfortunately nowadays computer users are growing more intelligent in the way that they create long and difficult to get passwords making Brute Force attack difficult to crack any password. It is in one way or the other similar to Dictionary attack and perhaps it may even be the upgrade of Dictionary attack.

2.Phishing


Phishing is the intended attempt to get usernames and passwords,often for malicious reasons, by pretending as a genuine agencies or companies, In phishing hackers design login pages similar to genuine for example they design a page similar to facebook page and they send it to you may be via email influencing you to login and perhaps to get something important, immediately you log in into such pages , they rather redirect you to the original agencies or websites having left behind(with them) your username and password.Phishing is the simplest technique used by hackers,It simply asks/ fishes users passwords, But it asks password is unique and different, Hackers used to create the fake page, fake emails, fake apps etc. It simply asks you to log in with your Id and password. and when you enter the details they are automatically transferred into hacker’s server. Its a very common technique used by hacker to track many users who are ignorant about this technique.

3.Shoulder Surfing



Shoulder surfing is the habit of spying on the user of a electronic devices or cash-dispensing machines so as to acquire their personal identification numbers (PIN), passwords and many other secret details It is commonly found in the Eye-catching Notes set in front of your LCD monitor which keep asking you to login into them.

4.Dictionary At
- See more at: http://www.gigatricks.com/2016/02/exciting-password-cracking-techniques.html#sthash.uulSX1xa.dpuf

Re: Exciting Password Cracking Techniques Used By Hackers - See More At: Http://www. by Nobody: 7:24pm On May 27, 2016
good to know
Re: Exciting Password Cracking Techniques Used By Hackers - See More At: Http://www. by shirgles(m): 10:18pm On May 27, 2016
So interesting
Re: Exciting Password Cracking Techniques Used By Hackers - See More At: Http://www. by bizfirst: 4:59am On May 28, 2016
In addition to the above, getting socurity related plugins such as Wordfence and configuring them properly can also be a life saver.

Aside this, avoiding the act of logging in from public computers can also help - especially if https isn't deployed and the risk of key logging is high.

Safety, online, comes first!

(1) (Reply)

Our Team Needs Two More Volunteers: Would You Love To Join / K / Programming/web Design+themes/web/apps Dev./automation/networking Video Tutorial

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 12
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.