1. Brute Force Attack
This is a type of attack where you will “find” all possible combinations of characters until there is a combination of characters that matches the character combination used as the password. This attack method helps us to see clearly the core strength of the password.
Join the channel Telegram of the AnonyViet π Link π |
2. Dictionary Attack
The problem with Brute Force Attack is that “finding” all “all” combinations takes me “time”. So the Dictionary Attack technique was born. This technique replaces the bluffing act of “guessing” with the calculated “guessing” action.
You can get a rough understanding of this attack method based on its own name “Dictionary” or “dictionary”, or in short you have a list of combinations of characters that are “highly likely” to be a password. Then check to see if there is a password in that list.
3. Hacker, Attacker, Script Kiddies and Cracker
– Hackers: People who perform intrusion and hack, People who are very good at Technology, Lun wants to follow a new path, Infiltrate the system and modify the nature and working state of the system.
– Attackers: People who use hacker inventions and attack the system
β Script Kiddies: People who want to attack the system or secure it, but only know how to use tools or the above 2 types to detect it without caring what their nature is.
– Crackers: WOMENpeople who belong to a school of hacking, specialized in cracking and knowledgeable about cryptography
4. Bugs, exploits
β Bug: is roughly understood as a hole
β exploit: For simplicity, an Exploit is a program that will exploit a bug (vulnerability) in a certain software. All exploits are different, they do different things with different bugs, that’s why exploits are always certain programs.
Exploits will give you the opportunity to gain root privileges on different operating systems (Windows/Linuxβ¦) by exploiting a vulnerability in the software when the software runs as root.