Guide | How To Brute Force Attacks – Definition and Prevention

The associated guide may contain user-generated or external content.

BoraMurdar

Super Moderator
Thread author
Verified
Staff Member
Well-known
Aug 30, 2012
6,598
There are many methods hackers use to get into a computer, computer network, a website or an online service. Carrying out a Brute Force Attack is one of them. It is one of the simplest, yet time consuming method to hack a server or a normal computer. The Brute force attack mechanism has its advantages – it can also used to check network security and to recover forgotten passwords. In this post we will try and understand Brute Force Attack definition and see the basic prevention method.

Brute Force Attacks
A Brute Force Attack is a type of Cyber Attack, where you have a software spinning up different characters to create a possible password combination. The Brute Force Attack password cracker software simply uses all possible combinations to figure out passwords for a computer or a network server. It is simple and does not employ any intelligent techniques. Since it is math based, it takes less time to crack a password using brute force applications rather than figuring them out manually. I said math based because computers are good at math and perform such calculations in split seconds compared to human brains, that take it longer to create combinations.

Brute-Force-Attacks.jpg


Brute Force Attack is good or bad depending upon the person using it. It could be a cyber criminal trying to hack into a network server or it could be a network admin trying to see how secure his or her network is. Some computer users also use brute force apps to recover forgotten passwords.

Speed of computing & passwords matter during Brute Force Attacks
If you are using all lower letters and no special characters or digits, it might be a work of just 2-10 minutes before a brute force attack can crack the password. However, a combination of upper case and lower case letters along with a digit (supposing there are eight digits), will take more than 14-15 years to crack the password.

It also depends upon the speed of computer processor, as to how long it takes to crack the password of network or normal login to a Windows standalone computer.

Thus it makes a lot of sense to have a strong passwords. To create really strong passwords, you can make use of ASCII characters to create stronger passwords. ASCII characters refer to all the characters available on the keyboard and more (you can see them by pressing ALT+numbers (0-255) on Numpad). There are some 255 ASCII characters and each one has a code that is read by machine and converted to binary (0 or 1) so that it can be used with computers. For example, the ASCII code for “space” is 32. When you enter a space, the computer reads it as 32 and converts it into binary – which would be 10000. These 1, 0, 0, 0, 0, 0 are stored as ON, OFF, OFF, OFF, OFF, OFF in the computer’s memory (that is made of electronic switches). This has nothing to do with brute force except that in case of use of all ASCII characters, if you use special characters in the password, the total time taken to crack the password could run above 100 years or so. I spoke about ASCII for people who do not know how characters are stored in computer’s memory.


Here is a link to a Brute Force Password Calculator, where you can check out how long it will take to crack a password. There are different options given that include lower case letters, upper case letters, digits, and all ASCII characters. Based on what you used in your password, select the options and click on calculate to see how difficult it would be for a Brute force attack to compromise your computer or server.

brute-force-password-calculator.jpg


Brute Force Attack Prevention & Protection
Since no special logic is applied in brute force attacks except for trying out different combinations of characters used for creation of a password, prevention on a very basic level, is relatively easy.

Apart from using a fully updated Windows operating system and security software, you should use a strong password that has some of the following characteristics:

  1. At least one upper case letter
  2. At least one digit
  3. At least one special character
  4. The password should be minimum of 8-10 characters
  5. ASCII characters, if you wish.
The lengthier a password is, the more time it will take to crack the password. If your password is something like ‘PA$$w0rd”, it will take more than a 100 years to crack it with currently available brute force attack apps. Please do not use the suggested password in example, as it is very easy to break it using some intelligent software that falls out of the realm of brute force attacks.

If you are using WordPress website software, then there are also many WordPress security plugins that automatically block brute force attacks. Using a web firewall like Sucuri or Cloudflare is another option you can consider. One way to block brute-force attacks is to lock out accounts after a defined number of failed password attempts. The Limit Logins WordPress plugin is good for stopping brute force attacks on your blog. Other measures include allowing logins from only select IP addresses, changing default login URLs to something else and using Captcha’s to harden your WordPress blog security.
TheWindowsClub
 

the unknwn

Level 1
Verified
Mar 8, 2015
47
john the ripper,brutus,hydra are some of the fastest bruteforcer iv'e ever seen but it takes a long long time to crack a alphanumeric passwords. using password generator is a good choice to prevent bruteforce attacks
 
  • Like
Reactions: BoraMurdar

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top