Headlines
Loading...
 Famous Password Hacking Techniques Used By Hackers 


Password🔑 Cracking Methods 

These are some best password hacking techniques used by hackers.

Dictionary Attacks

Dictionary method of password hacking is really famous these days.

In this method, hackers make wordlist in a text file with some common passwords, words or list of some guessed passwords.

Then they use any tool to perform this attack using that wordlist. The tool will automatically test every word in wordlist until they found the real password.

Brute Force Attack

Brute force attack is similar to a dictionary attack, but with a difference.

In brute force attack, hackers use a tool which automatically try every combination of words, characters and symbols until they find the real password.

It’s like, first they will try 
admin1 -> admin2 -> admin3 
and this series goes on until they come across the actual password.

Rainbow Tables Attack

Every plain text password is stored in hashes in the computer. Rainbow Table Attack uses a list of pre-computed hashes (and hashes of all possible password combination of any algorithm) and then compare those hashes.

This method takes less time to crack a password.

Phishing Attack

Another way to hack password is to directly ask for it from the victim? I know it’s stupid. But if you are a regular reader of this site then you already know what I mean.

In a phishing attack, a hacker makes a fake web page and then trick the victim into login on that fake page and when victim logs in, hacker gets the password.

This method is my favorite, all you have to do is to make a phishing page and then trick the user to login by using somethings you already know about them. Besides this, the phishing method is fun for me.

Keylogger / Screen scrapper

Hackers use keyloggers and screenscrappers to easily get plain text password of anyone from computer or smartphone.

Hackers simply install keylogger program in any computer or smartphone and then keylogger starts its work. It will start recording every keystrock from victim’s computer or phone’s keyboard and in the meantime; it will also capture the password and send the data back to the hacker.

Remember some time ago, I told you about hacking android phone using Spynote and Ahmyth RAT. Keylogger option is available in those RAT programs. You can use them.

On the other hand, screenscrapper programs keep capturing screenshots of victim’s screen and hackers gets them all. Chances are it’ll also capture the password.

Besides this, using screenscrapper just for capturing passwords is not enough use of it, you can also use these kinds of programs for surveillance.

Password 🔑 Guess 

The first step of ethical hacking and is Information Gathering, in which they collect as much information as possible about the target.

Hackers also use this information to guess password. For a normal computer and smartphone victim, who is not so tech-savvy, this technique mostly works.

Social  Engineering 

In Social Engineering, hackers mostly pretend to be a tech support guy and then call or interact with their victim and directly ask them for a password to manage the network or system.

Or they can also ask for some access to specific services or apps, which can be used to hack password.

Shoulder  Surfing 🌊
In shoulder surfing, you need to stand behind the victim while they are entering their password. It could help you in two ways.

Either you will get a password or you will get some information about password which can be used to create a wordlist and perform dictionary or brute force attack.

Enjoy 👍❤️

Copyright by internationalsuperhacker and asihackergroup.

I am a new member of Google bloggers. I am interested to learning knowledge and spread/share my ideas and knowledge in over the world.

0 Comments:

Our Team

  • Muhammad Ali Master / Computers
  • Muhammad IqbalMaster / Computers
  • Shehbaz iqbalMaster / Computers
  • Zoya iqbalMaster / Computers
  • Junaid iqbalMaster / Computers
  • Shahzad IqbalMaster / Computers
  • Copyrights @ Al-Shehbaz-Iqbal-hacker-group