Frequently Used Hackers Break Passwords

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@rahmat6457·
0.000 HBD
Frequently Used Hackers Break Passwords
know the computer world or indeed have previously learned about computers, then surely very interested in the world of hacking. A world where computer technology experts compete to prove themselves in terms of coding, networking, and programming. The ability of a hacker is able to penetrate the security system installed on the computer. However, the technique used is certainly still a lot of secrecy.

Well, below I will share a little experience about techniques that are generally or most suitable for use by newbie in breaking passwords.

<h3>**1. Dictionary**</h3>

This is the first and most widely used technique by hackers to easily hack passwords. Dictonary itself if we mean means a special dictionary, which means "dictionary" is certainly in this hacking world. This means the workings of this technique is a dictionary that contains many of the commonly used passwords of people such as, QWERTY, 123456, passwords, looping numbers, and more.

<h3>**2. Brute Force**</h3>
 ![image](https://img.esteem.ws/zfvlesja0d.jpg)

This second technique is one of my favorite techniques I used to be in college. Although never managed to break into a password because I'm tired of waiting too long, but this technique was quite widely used by the Hackers. Brute force is generally using a password that will search and match a combination of characters on the password. But, if the password is enough, for example more than 3 characters, then this will certainly take a long time. 

You just count yourself how many characters of letters, numbers, and punctuation at the moment, then multiply them for each combination.

<h3>**3. Phishing**</h3>
 ![image](https://img.esteem.ws/jibhadw0vb.jpg)

This technique also includes the most I use. This technique itself is a bit more complicated than the previous two techniques. Here you have to rely a bit on the ability in terms of web hosting and also html.

Because, this phishing technique does require these 2 points on its use. Where the victims will be stuck on a fake website page, which is similar to the original page of the website you want to go. Once the victim enters the user and password, it will be recorded on the hosting database which you can then use.

<h3>**4. Rainbow Table**</h3>
 ![image](https://img.esteem.ws/b2bl3q9cwo.jpg)

The Rainbow table itself is much more complicated than the 3 techniques above. But, usually this technique is used to breaking a password in offline mode. Here a hacker must also be able to get the user and password of the victim in the form of encryption. 

For example, if the victim is using MD5 encryption techniques that will randomize the password into a complicated character combination. Rainbow table is a tool that contains various kinds of encryption that you can match with the encryption that want to be hacked.

<h3>**5. Keylogger**</h3>
 ![image](https://img.esteem.ws/9hb07xcf87.jpg)

The next technique that I find the easiest is the keylogger. This technique itself uses a software called keylogger which currently there are many versions. How to use it is very easy.

You simply install the software on the victim's computer. Where the victim typed on the keyboard, all the results will be recorded. You just set the course a bit to be able to determine the keystrokes that match the user and password.
👍 , , , , , , , , , , , , , , , , , , , , , , , , , , , ,