Tools and techniques of brute force attack
Hydra and other well-known brute-force attackers
The thc-hydra tool is used by security researchers to find bugs in client applications. Hydra easily goes
through a huge range of password types, either by brute force or by using a dictionary. It has the
ability to target over 50 protocols and several operating systems. Hydra is an open framework with
new modules being developed all the time by the security community and attackers.
Other prime brute force tools are:
Aircrack-ng
Can be used on windows, linux, ios, and automaton. To break into wireless networks, it uses a
dictionary of commonly used passwords.
John the ripper
Runs on fifteen completely different platforms together with os, windows, and openvms. Tries all
potential combos employing a wordbook of potential passwords.
L0phtcrack
A tool for cracking windows passwords. Rainbow tables, dictionaries, and digital computing
algorithms are all employed.
Hashcat
Works on windows, linux, and mac os. Will carry out simple brute-force, rule-based, and hybrid
attacks with ease.
Davegrohl
An ascii text file tool for cracking macintosh os. Are often distributed across multiple computers.
Ncrack
A tool for cracking network authentication. It are often used on windows, linux, and
Comments
Post a Comment