In this series of password cracking I will be teaching you
- Social Engineering
- Dictionary Attacks
- Brute-Force Attacks
- Rainbow Tables
Before getting into any thing adventurous, let’s start our first part “Social Engineering”, Social engineering is the most easy way a hacker could use to get passwords from the master. Social engineering (S.E) is also a Art Of Telling Lie ( ? ).
There are many ways one can perform social engineering to gain passwords, Basically, What a hacker will do is, he will collect some information about your website/Company systems and some Basic Q/A to Handle the situation, Then, Using a Spoofed Email Address, He will pretend to be your company or using a spoofed call, He will pretend to be Head or Security Manager of your IT Department, He will ask for the password with a fake problem, And will satisfy you with a little information and some common Q/A about your company, You will yourself speak out the password and He’s Done With It!
This is how A Smart hacker carries out a social engineering attack on you.
Next on my BASIC hit list is Shoulder surfing,
Yes It is a shoulder surfing attack, means you are typing out your password and a guy with evil intentions look over your shoulder to copy the password and could access it in your absence.
And then it comes on Guessing,
A hacker can also guess your password as many of the users have very low password strength, like if hacker know a person personally in his office or work, He can guess the password like, your date of birth, full name, sir name, pet name, home address. And if you are vulnerable their then BINGO -_-!
He got you!
So, Now you have low-tech information about cracking passwords. In part 2 of the Series: Password Cracking, I Will Be Explaining Dictionary Attacks. So Practice these skill with your best friend, use Fake E-mailer to speak him out with the passwords.
Till then, I will prepare a good Article for you guys to understand and perform Dictionary attacks.
“Hunted” schoolgirls’ nude images and personal info published online
More than 2,000 sexual images of underage girls and women have been shared by teen boys and young men, on an...August 17, 2016
Why you STILL can’t trust password strength meters
I’m worried about password strength meters. In March 2015 I tested five popular password strength meters in a simple experiment that...August 17, 2016
Facebook’s unblockable-ads push is a “big bluff”
Facebook, the adblocker ball’s back in your court, but researchers seem to have punched some holes in your racket. I’ve just...August 17, 2016
Did “The Shadow Brokers” hack NSA cyberweapons worth $500M?
A self-styled hacking group going by The Shadow Brokers have started a tongue-in-cheek media campaign claiming that they’ve penetrated the NSA...August 16, 2016
US hotels hit by payment card slurping malware
The chain that owns Westin, Starwood, Marriott, Hyatt, Intercontinental and Le M?ridien hotels – HEI Hotels & Resorts – on Friday...August 16, 2016
People like using passwords way more than biometrics
A new survey shows that we’ll give up our passwords only when they’re pried from our cold, dead hands. That’s more...August 16, 2016
“You dirty RAT” – Spy versus Spy in the cybercrime underworld
Thanks to Gabor Szapannos of SophosLabs, who did the hard work behind this article. Not all malware is ransomware, even though...August 16, 2016
Silk Road suspect “Libertas” can be extradited to US, says court
Back in December 2013, the US Department of Justice (DoJ) charged three individuals with three different offences stemming from the now-defunct...August 15, 2016
Tech support scammer tricked into installing ransomware
First things first, we do not recommend that you screw around with crooks. That includes fake support calls, 419 scammers and...August 15, 2016