Académique Documents
Professionnel Documents
Culture Documents
6 Most Common Password Cracking Methods And Their Countermeasures | Cool Hacking Tricks
Facebook Hacking.... Click Here
Follow @nakib14
Home
Blogging
Facebook Tricks
Ebooks
Tricks
Hacking
Guest Posting
About
Windows
Advertise
WhitePapers
Video Tuts
Liked Us?
Like
34k
196 followers
1.2k
Contact Us
SUBSCRIBE NOW!
Submit
163
Like
54
There are number of methods out their used by hackers to hack your account or get
your personal information. Today in this post i will share with you guys 6 Most
commonly used method to crack password and their countermeasures. You must check
out this article to be safe and to prevent your online accounts from hacking.
13
1. BruteForce Attack
15
30
Any password can be cracked using Brute-force attack. Brute-force attacks try every
possible combinations of numbers, letters and special characters until the right
password is match. Brute-force attacks can take very long time depending upon the
complexity of the password. The cracking time is determined by the speed of computer
and complexity of the password.
Countermeasure: Use long and complex passwords. Try to use combination of upper
and lowercase letters along with numbers. Brute-force attack will take hundreds or
2. Social Engineering
Social engineering is process of manipulating someone to trust you and get information
from them. For example, if the hacker was trying to get the password of a co-workers
or friends computer, he could call him pretending to be from the IT department and
simply ask for his login details. Sometime hackers call the victim pretending to be
from bank and ask for their credit cards details. Social Engineering can be used to get
someone password, to get bank credentials or any personal information.
http://www.coolhackingtrick.com/2014/01/6-most-common-password-cracking-methods.html
1/6
11/1/2014
6 Most Common Password Cracking Methods And Their Countermeasures | Cool Hacking Tricks
Countermeasure: If someone tries to get your personal or bank details ask them few
questions. Make sure the person calling you is legit. Never ever give your credit card
Follow
details on phone.
+1
+ 1,255
Follow @nakib14
196 followers
Nakib Momin
Follow
In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows
hacker to monitor every thing victim do on his computer. Every keystroke is logged
including passwords. Moreever hacker can even control the victims computer.
Countermeasure: Never login to your bank account from cyber cafe or someone else
computer. If its important use on-screen or virtual keyboard while tying the login. Use
latest anti-virus software and keep them updated. Check out below article to know
more about Rats and Keyloggers.
What is RAT ?
What Is Keylogger And How To Be Safe From Keyloggers?
Already a member? Sign in
4. Phishing
POPULAR POSTS
Phishing is the most easiest and popular hacking method used by hackers to get
someone account details. In Phishing attack hacker send fake page of real website like
facebook, gmail to victim. When someone login through that fake page his details is
send to the hacker. This fake pages can be easily created and hosted on free web-
hosting sites.
Countermeasure: Phishing attacks are very easy to avoid. The url of this phishing
pages are different from the real one. For example URL of phishing page of facebook
might look like facbbook.com (As you can see There are two "b"). Always make sure
that websites url is correct. Check out below article to know more about phishing.
All About Phishing And How To Be Safe From Phishing ?
5. Rainbow Table
A Rainbow table is a huge pre-computed list of hashes for every possible combination
of characters. A password hash is a password that has gone through a mathematical
algorithm such as md5 and is transformed into something which is not recognizable. A
hash is a one way encryption so once a password is hashed there is no way to get the
original string from the hashed string. A very commonly used hashing algorithm to
store passwords in website databases is MD5. It is almost similar to dictionary attack,
the only difference is, in rainbow tables attack hashed characters are used as
passwords whereas in dictionary attack normal characters are used as passwords.
Categories
Extras
ANNOUNCEMENT
Android
BACKTRACK
BATCH
PROGRAMMING
BLOG
WIDGETS
BLOGGING
BROWSER TRICKS CMD Computer Programming
DDoS Desktop Apps DOWNLOADS EBOOKS Email
Application
FACEBOOK
TRICKS
Hacking
Hackers
EBOOKS
HACKING
INTERESTING TRICKS
ICONS
IP ADDRESS
MOBILE
http://www.coolhackingtrick.com/2014/01/6-most-common-password-cracking-methods.html
Comments
MOVIES
2/6
11/1/2014
6 Most Common Password Cracking Methods And Their Countermeasures | Cool Hacking Tricks
HACKING
REGISTRY
PHISHING PROGRAMMING
Reviews
SOFTWARES
SQL
Countermeasure: Make sure you choose password that is long and complex. Creating
VIRTUAL
tables for long and complex password takes a very long time and a lot of resources
YOUTUBE TRICKS
6. Guessing
Security
INJECTION
MACHINE
VIRUS
CATEGORIES
INTERESTING
TRICKS
WINDOWS
HACKING
EBOOKS
EBOOKS RAT
Smartphone
VIDEO
Apps
TUTORIALS
WINDOWS
SUPPORT US
If our Tutorials
have helped you
a
little,
then
kindly spread our
voice using the
badge below:-
FACEBOOK
Hacking EBOOKS
BATCH
PROGRAMMING
This seems silly but this can easily help you to get someones password within seconds.
BROWSER TRICKS
<a href="http://www.coolhackingtric
BLOG ARCHIVE
If hacker knows you, he can use information he knows about you to guess your
DOWNLOADS
password. Hacker can also use combination of Social Engineering and Guessing to
GOOGLE TRICKS
August (1)
PASSWORD HACKING
March (4)
SOFTWARES
February (5)
Hackers
January (9)
Countermeasure: Don't use your name, surname, phone number or birthdate as your
password. Try to avoid creating password that relates to you. Create complex and long
password with combination of letters and numbers.
YOUTUBE TRICKS
NOTEPAD TRICKS
Subscribe
BLOGGING
Softwares
Computer
Programming
Outside
Hollywood -
PROGRAMMING
How
EBOOKS
Hacking
VIDEO TUTORIALS
LINUX
MOBILE
BLOG WIDGETS
FIREFOX
GAMES
GOOGLE
Hacking Someone's Facebook Password Using Some Software Or Website? No Sir You
ICONS
Can't!
REGISTRY
Android
DDoS
Desktop Apps
Email Application
JAVASCRIPT TRICKS
Web
History?
Cool Services
To Enhance
Your Email
Experience
And...
Top 6 Websites
To Learn
Computer
Programming
Langu...
Top 6 White
Hat Hackers
In The
World
How To
Download
APK Files
Directly
PHISHING
RAT
SQL INJECTION
Security
Smartphone Apps
VIRTUAL MACHINE
http://www.coolhackingtrick.com/2014/01/6-most-common-password-cracking-methods.html
Your Google
LINK EXCHANGE
Reviews
Vinod Hemdev on 5 January 2014 17:14 said... 1
Really Beg...
How To
Remove All
KEYLOGGER
MOVIES
12 comments:
Can Cost...
Hackers
IP ADDRESS
CMD
Free
Services
And
BACKTRACK
Computer Hacking in the New Age, All you Need to Know about Hacking Today
ANNOUNCEMENT
VIRUS
2014 (19)
From Google
Pla...
6 Most
Common
Password
Cracking
Methods
And Their ...
How To Run
3/6
11/1/2014
6 Most Common Password Cracking Methods And Their Countermeasures | Cool Hacking Tricks
Nakib Momin on 5 January 2014 18:14 said... 2
@vinod thanks :)
WhatsApp
On Your
Desktop
Computer?
2013 (27)
2012 (38)
2011 (53)
http://www.coolhackingtrick.com/2014/01/6-most-common-password-cracking-methods.html
4/6
11/1/2014
6 Most Common Password Cracking Methods And Their Countermeasures | Cool Hacking Tricks
Port-Blair
Pune
Shimla
Tripura
http://www.coolhackingtrick.com/2014/01/6-most-common-password-cracking-methods.html
5/6
11/1/2014
6 Most Common Password Cracking Methods And Their Countermeasures | Cool Hacking Tricks
http://www.coolhackingtrick.com/2014/01/6-most-common-password-cracking-methods.html
6/6