The 9 Most Common Tricks Used to Hack Passwords

Trending 1 week ago

Want to fig retired someone's password? Review your life choices. Learn really to protect your password from hackers instead.

Image Credit: SergeyNivens/Depositphotos

Key Takeaways

  • Your password is nan cardinal to your online security. If it's elemental aliases commonly used, hackers tin easy conjecture it and summation entree to your accounts.
  • Hackers usage various strategies for illustration dictionary attacks, brute unit attacks, and disguise attacks to ace passwords. Using strong, analyzable passwords pinch a operation of characters is crucial.
  • Phishing and societal engineering are communal ways to bargain passwords. Be skeptical of suspicious emails and debar giving retired delicate information. Use a password head and support your package updated to heighten security.

When you perceive "security breach," what springs to mind? A malevolent hacker sitting successful beforehand of screens covered successful Matrix-style integer text? Or a basement-dwelling teen who hasn't seen daylight successful 3 weeks? How astir a powerful supercomputer attempting to hack nan full world?

Hacking is each astir 1 thing: your password. If personification tin conjecture your password, they don't request fancy hacking techniques and supercomputers. They'll conscionable log in, acting arsenic you. If your password is short and simple, it's crippled over.

There are 9 communal strategies hackers usage to hack your password.

1. Dictionary Hack

First up successful nan communal password hacking strategies guideline is nan dictionary attack. Why is it called a dictionary attack? Because it automatically tries each connection successful a defined "dictionary" against nan password. The dictionary isn't strictly nan 1 you utilized successful school.

No. This dictionary is simply a mini record containing nan astir commonly utilized password combinations, making it easy to conjecture someone's password. That includes 123456, qwerty, password, iloveyou, and nan all-time classic, hunter2.

top 20 leaked passwords 2016

The supra array elaborate nan astir leaked passwords successful 2016. The beneath array elaborate nan astir leaked passwords successful 2020.

top 20 leaked passwords 2020

Note nan similarities betwixt nan two—and make judge you don't usage these incredibly elemental options. Now, has thing changed 3 years later, successful 2023? Absolutely not. We've moreover added 10 much of nan astir commonly leaked passwords to show conscionable really bad they are.

what are nan astir leaked passwords of 2023

Long communicative short, if you don't want personification to fig retired your password, ne'er usage immoderate of these.

  • Pros: Fast; will usually unlock immoderate woefully protected accounts.
  • Cons: Even somewhat stronger passwords will stay secure.
  • Stay safe: Use a beardown single-use password for each relationship successful conjunction pinch a password guidance app. The password head lets you shop your different passwords successful a repository. Then you tin usage a single, ridiculously beardown password for each site. Google Chrome and different awesome browsers person an integrated password manager, but standalone password managers are typically considered much secure.

2. Brute Force

Next up is nan brute unit attack, whereby an attacker tries each imaginable characteristic operation successful an effort to conjecture your password. Attempted passwords will lucifer nan specifications for nan complexity rules, e.g., including 1 upper-case, 1 lower-case, decimals of Pi, your pizza order, and truthful on.

A brute unit onslaught will besides effort nan astir commonly utilized alphanumeric characteristic combinations first, too. These see nan antecedently listed passwords, arsenic good arsenic 1q2w3e4r5t, zxcvbnm, and qwertyuiop. It tin return a very agelong clip to fig retired a password utilizing this method, but that depends wholly connected password complexity.

  • Pros: Theoretically, it will ace immoderate password by measurement of trying each combination.
  • Cons: Depending connected password magnitude and difficulty, it could return an highly agelong time. Throw successful a fewer variables for illustration $, &, {, aliases ] and widen your password to 16 characters (at nan minimum!), and figuring retired nan password becomes highly difficult.
  • Stay safe: Always usage a adaptable operation of characters, and wherever possible, introduce other symbols to summation complexity.

3. Mask Attack

What happens if nan personification stealing your password knows immoderate of it already? Can they usage nan snippets of accusation to make cracking nan remainder of nan password easier?

That's precisely what a disguise password onslaught is. As it still involves trying galore password combinations, a disguise onslaught is akin to a brute-force attack. However, successful a disguise attack, nan password thief whitethorn already cognize a fewer precious characters from your password, making nan process of uncovering nan remainder easier.

  • Pros: Similar to brute-force, tin theoretically ace immoderate password fixed capable time. Slightly faster than outright brute-force arsenic immoderate characters are already known.
  • Cons: Again, if nan password is agelong capable and contains unsocial characters and variables, moreover pinch nan existing knowledge, cracking nan password whitethorn beryllium impossible.
  • Stay safe: Always usage a long, unsocial password pinch plentifulness of variety successful characters.

4. Phishing

This isn't strictly a "hack," but falling prey to a phishing aliases spear-phishing effort will usually extremity badly. General phishing emails are sent by nan billions to each mode of net users astir nan globe, and it is 1 of nan astir celebrated ways to find retired someone's password.

A phishing email mostly useful for illustration this:

  1. The target personification receives a spoofed email purporting to beryllium from a awesome statement aliases business.
  2. Spoofed email demands contiguous attention, featuring a nexus to a website.
  3. This nexus really connects to a clone login portal, mocked up to look precisely nan aforesaid arsenic nan morganatic site.
  4. The unsuspecting target personification enters their login credentials and is either redirected aliases told to effort again.
  5. User credentials are stolen, sold, aliases utilized nefariously (or both).

The regular spam measurement sent worldwide remains high, accounting for complete half of each emails sent globally. Furthermore, nan measurement of malicious attachments is high, too, pinch Kaspersky blocking complete 166 cardinal malicious attachments successful 2022—18 cardinal much than successful 2021. But nan much shocking fig is nan number of phishing links blocked, rising from 253 cardinal successful 2021 to 507 cardinal successful 2022. Remember, this is conscionable for Kaspersky, truthful the existent number is overmuch higher.

Back successful 2017, nan biggest phishing lure was a clone invoice. However, successful 2020, the COVID-19 pandemic provided a caller phishing threat. In April 2020, not agelong aft galore countries went into pandemic lockdown, Google announced it was blocking complete 18 cardinal COVID-19-themed malicious spam and phishing emails per day. Huge numbers of these emails usage charismatic authorities aliases wellness statement branding for legitimacy and drawback victims off-guard.

  • Pros: The personification hands complete their login information, including passwords—relatively precocious deed rate, easy tailored to circumstantial services aliases specific group successful a spear-phishing attack.
  • Cons: Spam emails are easy filtered, spam domains are blacklisted, and awesome providers for illustration Google perpetually update protections.
  • Stay safe: Stay skeptical of emails, and summation your spam select to its highest mounting or, amended still, usage a proactive whitelist. Use a nexus checker to ascertain if an email nexus is morganatic earlier clicking.

Social engineering is fundamentally phishing successful nan existent world, distant from nan screen.

A halfway portion of immoderate information audit is gauging what nan workforce understands. For instance, a information institution will telephone nan business they are auditing. The "attacker" tells nan personification connected nan telephone they are nan caller agency tech support squad and they request nan latest password for thing specific.

An unsuspecting individual whitethorn manus complete nan keys without a region for thought.

The scary point is really often this works. Social engineering has existed for centuries. Being duplicitous to summation introduction to a unafraid area is simply a communal method of onslaught and 1 that is only guarded against pinch education. This is because nan onslaught won't ever inquire straight for a password. It could beryllium a clone plumber aliases electrician asking for introduction to a unafraid building, and truthful on. When personification says they were tricked into revealing their password, it is often nan consequence of societal engineering.

  • Pros: Skilled societal engineers tin extract high-value accusation from a scope of targets. It tin beryllium deployed against almost anyone, anywhere. It's highly stealthy, and professionals are adept astatine extracting accusation that could thief conjecture a password.
  • Cons: A societal engineering nonaccomplishment tin raise suspicions astir an impending onslaught and uncertainty astir whether nan correct accusation is procured.
  • Stay safe: This is simply a tricky one. A successful societal engineering onslaught will beryllium complete earlier you recognize thing is wrong. Education and information consciousness is simply a halfway mitigation tactic. Avoid posting individual accusation that could beryllium later utilized against you.

6. Rainbow Table

md5 hash illustration logmein

A rainbow array is usually an offline password attack. For example, an attacker has acquired a database of personification names and passwords, but they're encrypted. The encrypted password is hashed. This intends it looks wholly different from nan original password.

For instance, your password is (hopefully not!) logmein. The known MD5 hash for this password is "8f4047e3233b39e4444e1aef240e80aa."

Gibberish to you and I. But successful definite cases, nan attacker will run a database of plaintext passwords done a hashing algorithm, comparing nan results against an encrypted password file. In different cases, nan encryption algorithm is vulnerable, and astir passwords are already cracked, for illustration MD5 (hence why we cognize nan circumstantial hash for "logmein").

This is wherever nan rainbow array comes into its own. Instead of processing hundreds of thousands of imaginable passwords and matching their resulting hash, a rainbow array is simply a immense group of precomputed algorithm-specific hash values. Using a rainbow array drastically decreases nan clip it takes to ace a hashed password—but it isn't perfect. Hackers tin acquisition prefilled rainbow tables populated pinch millions of imaginable combinations.

  • Pros: Can fig retired analyzable passwords successful a short magnitude of time; grants nan hacker a batch of powerfulness complete definite information scenarios.
  • Cons: Requires a immense magnitude of abstraction to shop nan tremendous (sometimes terabytes) rainbow table. Also, attackers are constricted to nan values contained successful nan array (otherwise, they must adhd different full table).
  • Stay safe: Another tricky one. Rainbow tables connection a wide scope of attacking potential. Avoid immoderate sites that usage SHA1 aliases MD5 arsenic their password hashing algorithm. Avoid immoderate sites that limit you to short passwords aliases restrict nan characters you tin use. Always usage a analyzable password.

7. Malware/Keylogger

Another judge measurement to suffer your login credentials is to autumn foul of malware. Malware is everywhere, pinch nan imaginable to do monolithic damage. If nan malware version features a keylogger, you could find all of your accounts compromised.

Alternatively, nan malware could specifically target backstage information aliases present a distant entree Trojan to bargain your credentials. Another action is to analyse nan web to bargain immoderate passwords sent successful plaintext alternatively of encrypted ciphertext (in a man-in-the-middle attack). If a institution sends passwords anyplace utilizing plaintext (that's conscionable regular human-readable text), location is simply a beardown chance of password theft.

The usage of malware extends to stealing your password connected your smartphone. If you download malware aliases a keylogger connected your smartphone aliases tablet, it's nan aforesaid rumor arsenic pinch your desktop aliases laptop. Your smartphone is apt big to countless apps, and you typically request a password for each one, and smartphone malware will happily bargain your banking, societal media, and different credentials.

  • Pros: Thousands of malware variants, galore customizable, pinch respective easy transportation methods. A bully chance a precocious number of targets will succumb to astatine slightest 1 variant. It tin spell undetected, allowing further harvesting of backstage information and login credentials.
  • Cons: Chance that nan malware won't activity aliases is quarantined earlier accessing data; nary guarantee that information is useful.
  • Stay safe: Install and regularly update your antivirus and antimalware software. Carefully see your download sources. Do not click done installation packages containing bundleware and more. Steer clear of vulnerable aliases malicious sites (easier said than done). Use script-blocking devices to extremity malicious scripts.

8. Spidering

Spidering ties into nan dictionary attack. If a hacker targets a circumstantial institution aliases business, they mightiness effort a bid of passwords relating to nan business itself. The hacker could publication and collate a bid of related terms—or usage a hunt spider to do nan activity for them.

You mightiness person heard nan word "spider" before. These hunt spiders are highly akin to those that crawl done nan internet, indexing contented for hunt engines. The civilization connection database is past utilized against personification accounts successful nan dream of uncovering a match.

  • Pros: Can perchance unlock accounts for high-ranking individuals wrong an organization. Relatively easy to put together and adds an other magnitude to a dictionary attack.
  • Cons: Could extremity up fruitless if organizational web information is good configured.
  • Stay safe: Again, only usage strong, single-use passwords comprised of random strings; thing linking to your persona, business, organization, and truthful on.

9. Shoulder Surfing

The last action is 1 of nan astir basic. What if personification conscionable looks complete your enarthrosis while you're typing successful your password?

Shoulder surfing sounds a small ridiculous, but it does happen. It's for illustration 1 of those hacking tricks you deliberation would ne'er work. But if you're moving successful a engaged downtown café and not paying attraction to your surroundings, personification could get adjacent capable to statement your password arsenic you type, but it's astir apt not nan easiest measurement to fig retired someone's password.

  • Pros: Low exertion attack to stealing a password.
  • Cons: Must place nan target earlier figuring retired nan password; could uncover themselves successful nan process of stealing.
  • Stay safe: Remain observant of those astir you erstwhile typing your password. Cover your keyboard and obscure your keys during input.

5 Ways to Keep Your Online Accounts Safe From Password Theft

So, really do you extremity a hacker from stealing your password? The really short reply is that you cannot genuinely beryllium 100 percent safe. The devices hackers usage to bargain your information are changing each nan time, and location are countless videos and tutorials connected guessing passwords, learning really to hack a password, aliases moreover conscionable really to fig retired someone's password.

  1. Unique password: Using a strong, unique, single-use password is important. If your passwords are breached, nan unsocial password will only assistance entree to 1 service.
  2. Antivirus/antimalware: Make judge you're utilizing a decent information tool. Upgrading to Malwarebytes Premium is simply a awesome action and offers cross-device support.
  3. Update: Updating your package is time-consuming; we get it. But out-of-date package is often wherever information vulnerabilities lurk and those vulnerabilities tin lead to stolen passwords.
  4. Attachments: Don't unfastened attachments if you don't cognize nan sender. Use an antivirus instrumentality to scan immoderate attachments earlier opening, and if you can't verify aliases are unsure, don't unfastened it.
  5. Password manager: Consider installing a password manager to support way of your passwords. They tin thief protect your online accounts.

Keeping your passwords safe isn't a one-off. You must see nan full gamut of password information protection methods to support your accounts safe.

Make Password Hacking Difficult!

If you cognize nan astir communal ways passwords are hacked, you're already taking steps to protect your online accounts. So agelong arsenic you're taking into relationship really to support your passwords safe, you're taking affirmative steps, which should make it difficult for a hacker to bargain your passwords.

Source Tutorials
Tutorials