::: WELCOME TO ALL VISITORS ! ::: IF ANY ONE WANT TO PUBLISH THERE ( SOFTWARES /NOTES / ENGINEERING MATERIALS ) THEN FEEL FREE TO COMMENT US ON BLOG OR MAIL US @ DHINCHAKDEVELOPERS@GMAIL.COM WE PUBLISH IT @ OUR BLOG/WEBSITE ON YOUR BEHALF..

VI MOST COMMON PASSWORD CRACKING METHODS AND THEIR DEFENSIVE RESPONSE

There are number of methods out their used by hackers to hack your account or get your personal information. Today in this post we will share with you guys 6 Most commonly used method to crack password and their countermeasures. You must check out this article to be safe and to prevent your online accounts from hacking.AS Hacking is one of the serious crime in IT industry.PASSWORD cracking is one of the method used by Hackers to break codes and theft important data/information.

  • BruteForce Attack

Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the rightpassword is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.
Countermeasure: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.IN INDIA most of  common mans use simple passwords to secure their personal data but it is not good enough to secure their data.more simpler your password MORE is THE CHANCE to GUESS/HACKED. 
Example: Passwords like "iloveu" or "password" can be cracked easily whereas computer will take years to crack passwords like "aN34l00"


  • Social Engineering


SOCIAL ENGINEERING MEANS to APPLY THE PHYSOCOLOGY 
PRINCIPLES TO THE HUMAN DURING MANUFACTURING PROCESS SUCH THAT IT MAKES EASIER TO USE AND HANDLE. Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be frombank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.
Countermeasure: If someone tries to get your personal or bank details ask them few questions. Make sure the person calling you is legit. Never ever give your credit card details on phone.


  • Rats And Keyloggers


In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.
Countermeasure: Never login to your bank account from cyber cafe or someone else computer. If its important use on-screen or virtual keyboard while tying the login. Use latest anti-virus software and keep them updated.
  •  Phishing

Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.
Countermeasure: Phishing attacks are very easy to avoid. The url of this phishing pages are different from the real one. For example URL of phishing page of facebook might look like facbbook.com (As you can see There are two "b"). Always make sure that websites url is correct.


  • GUESSING
https://www.facebook.com/DhiNNchAak?ref=hl


This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess yourpassword. Hacker can also use combination of Social Engineering and Guessing to acquire your password.
Countermeasure: Don't use your name, surname, phone number or birthdate as yourpassword. Try to avoid creating password that relates to you. Create complex and longpassword with combination of letters and numbers.

















1 comment: