By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Three Password Cracking Techniques and How to Defend Against Them
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Three Password Cracking Techniques and How to Defend Against Them
Computing

Three Password Cracking Techniques and How to Defend Against Them

News Room
Last updated: 2025/02/26 at 8:47 AM
News Room Published 26 February 2025
Share
SHARE

Feb 26, 2025The Hacker NewsIdentity Protection / Password Security

Passwords are rarely appreciated until a security breach occurs; suffice to say, the importance of a strong password becomes clear only when faced with the consequences of a weak one. However, most end users are unaware of just how vulnerable their passwords are to the most common password-cracking methods. The following are the three common techniques for cracking passwords and how to defend against them.

Brute force attack

Brute force attacks are straightforward yet highly effective techniques for cracking passwords. These attacks involve malicious actors using automated tools to systematically try every possible password combination through repeated login attempts. While such tools have existed for years, the advent of affordable computing power and storage has made them even more efficient today, especially when weak passwords are used.

How it works

When it comes to brute force attacks, malicious actors employ a range of tactics—from simple brute force attacks that test every possible password combination to more nuanced approaches like hybrid and reverse brute force attacks. Each method has a distinct strategy behind it, but the motives behind brute force attacks are the same: to gain unauthorized access to protected data or resources.

Some popular automated tools for carrying out brute force attacks include:

  • John the Ripper: a multiplatform password cracker with support for 15 different operating systems and hundreds of hashes and cipher types
  • L0phtCrack: a tool that uses rainbow tables, dictionaries, and multiprocessor algorithms to crack Windows passwords
  • Hashcat: a cracking/password recovery utility that supports five unique modes of attack for over 300 highly-optimized hashing algorithms

Examples

Back in August 2021, U.S. mobile operator T-Mobile fell victim to a data breach that started with a brute force attack. The security compromise resulted in the exposure of over 37 million customer records containing sensitive data like social security numbers, driver’s license information, and other personally identifiable data.

Defense measures

Users should choose strong, complex passwords and multi-factor authentication (MFA) to protect against brute force attacks. Administrators should implement account lockout policies and continuously audit their Windows environments for weak and breached passwords. Tools like Specops Password Auditor can automate these processes across expansive IT environments.

Dictionary attack

In a password dictionary attack, cyber attackers try to gain access by using a list of common passwords or words from a dictionary. This predefined word list typically includes the most often used words, phrases, and simple combinations (i.e., “admin123”). Password dictionary attacks underscore the importance of complex, unique passwords, as these attack types are especially effective against weak or easily guessable passwords.

How it works

The process starts with compiling a list of potential passwords from data breaches, common password lists, or publicly available resources. Using an automated tool, malicious actors perform a dictionary attack, systematically testing each password against a target account or system. If a match is found, the hacker can gain access and carry out subsequent attacks or movements.

Examples

Malicious actors used password dictionaries to crack hashed passwords in several high-profile security incidents, such as the 2013 Yahoo data breach and the 2012 LinkedIn data breach. This allowed them to steal the account information of billions of users.

Defense measures

When creating or resetting passwords, users should use a combination of letters, numbers, and special characters, and avoid using common words or easily guessable phrases. Administrators can implement password complexity requirements in their policies to enforce these mandates across the organization.

Rainbow table attacks

A rainbow table attack uses a special table (i.e., a “Rainbow Table) made up of precomputed strings or commonly used passwords and corresponding hashes to crack the password hashes in a database.

How it works

Rainbow table attacks work by exploiting chains of hashing and reduction operations to efficiently crack hashed passwords. Potential passwords are first hashed and stored alongside their plaintext counterparts in the rainbow table, then processed with a reduction function that maps them to new values, resulting in a chain of hashes. This process is repeated multiple times to build the rainbow table. When hackers obtain a hash list, they can reverse lookup each hash value in the rainbow table—once a match is identified, the corresponding plaintext password is exposed.

Examples

While salting (a method of adding random characters to passwords before hashing) has reduced the effectiveness of rainbow table attacks, many hashes remain unsalted; additionally, advances in GPUs and affordable hardware have eliminated the storage limitations once associated with rainbow tables. As a result, these attacks continue to be a likely tactic in current and future high-profile cyber-attacks.

Defense measures

As mentioned previously, salted hashes have significantly reduced the effectiveness of precomputed tables; organizations should therefore implement strong hashing algorithms (e.g., bcrypt, scrypt) in their password processes. Administrators should also regularly update and rotate passwords to reduce the likelihood of rainbow table dictionary matches/hits.

In short, passwords aren’t perfect, but complex and sufficiently long passphrases remain a vital first line of defense against advanced password-cracking techniques. Tools like Specops Policy provide an extra layer of protection by continuously scanning Active Directory against a database of over 4 billion breached passwords. Contact us for a free demo today.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Apple Is Fixing the iPhone Dictation Bug That Displays ‘Trump’ for ‘Racist’
Next Article Qualcomm wants to bring longer Android support to more phones
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

INE Security Alert: Top 5 Takeaways From RSAC 2025 | HackerNoon
Computing
Today's NYT Connections: Sports Edition Hints, Answers for May 14 #233
News
QNAP TDS-H2489FU R2, a NAS for critical applications
Mobile
UKRI must do more to drive innovation agenda and avoid fraud | Computer Weekly
News

You Might also Like

Computing

INE Security Alert: Top 5 Takeaways From RSAC 2025 | HackerNoon

8 Min Read
Computing

The Dead Internet is Very Real and Very Profitable | HackerNoon

6 Min Read
Computing

TechnologyNewsMedia.com – The $100 Guest Post Scam Garbage Fire | HackerNoon

4 Min Read
Computing

Add Real-time Temperature Monitoring to the Proxmox VE Dashboard | HackerNoon

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?