Password Managers Reviews

  • Reviews
    • Coupons
    • Free Versions
  • Business
  • Comparison
  • Articles
    • FAQ
  • More
    • Antivirus Software
    • Internet Security Suites
    • Mac Security Suites
    • More Reviews
Best Reviews > Password Managers Reviews > Articles > The Different Types of Password Cracking Techniques

Best Reviews may receive compensation for its content through paid collaborations and/or affiliate links. Learn more about how we sustain our work and review products.

The Different Types of Password Cracking Techniques

By Istvan F. Verified by Mary P.
Last updated: December 18, 2017

HackedHumans are considered the weakest link when it comes to data security since they will typically pick passwords that are easier to remember over something that is more secure. But this way the password becomes easy to hack, as well. And even if the user has come up with a strong password, there are still numerous techniques to crack it open in a just a few hours using a regular computer.

There are two main categories of password cracking techniques: offline and online. Online attacks are performed on a live host or system by either brute-force or wordlist attack against a login form, session, or other type of authentication technique used.

Secure vault - safe hacked


30% Discount for First-Time RoboForm Users (Ad)
RoboForm logo

Use our special promotional code below and if you haven’t used RoboForm before you can enjoy RoboForm Everywhere or Family for as low as $1.16 per month, saving 30% on the subscription fees.

Use this coupon while placing your order: BR60
Click to Reveal Coupon

Offline attacks are done by extracting the password hash or hashes stored by the victim and attempting to crack them without alerting the targeted host, which makes offline attacks the most widespread method of password cracking. Security holes in the victim's infrastructure are what make this type of attack possible.

Brute-Force Attacks

Brute-force attackOne of the most popular cracking techniques for passwords of up to eight characters is the brute-force attack. This is basically a hit-and-miss method, as the hacker systematically checks all possible characters, calculates the hash of the string combination and then compares it with the obtained password hash.

The success of brute-force attacks depends on the length of the password. In a brute-force attack the hacker tries every single combination of letters, numbers, and punctuation to generate a password. If the password is long, this technique takes more time: from minutes to several years, depending on the system used and password length.

Dictionary Attacks

Dictionary attackWhile similar to a brute-force attack, there is one major difference between the two techniques. In this scenario, the hacker uses a list of probable matches (based on words of the English language, for example) instead of trying all potential characters one by one. Dictionary attack tools often include known passwords, words from the English language, sentences from books, and more.

Combined Dictionary Attacks

Taking the dictionary attack one step further and adding even more complexity, hackers can combine a list of existing words with numbers in the same way that humans might when creating new passwords – such as by swapping the letter ‘e’ with ‘3’. This technique is called a “combined dictionary” attack, where the database used can contain words from one or more dictionaries.

Hybrid Dictionary and Rule-Based Dictionary Attacks

The hybrid dictionary attack is the method of taking the words listed in a dictionary and combining them with a brute-force attack by prepending three numbers to each entry. You'll get results such as 111apple up to 999apple. This, however, can still take some time to generate results, so spicing up the password guesswork with a few rules can shorten the length of time it might take to crack. This method, however, leaves plenty of room for hacker creativity in defining the rules that the password cracking software will apply.

Rainbow Table Attacks

A rainbow table is a pre-compiled table used for recovering hashes. Each rainbow table is for a specific length of password containing a well-defined set of characters. This technique aims to reduce the guessing time but is limited to passwords no longer than nine characters and hashes without password salt.

Markov Chains Attacks

To use the Markov Chains technique hackers need to assemble a certain password database, split each password into 2-grams and 3-grams (2- and 3-character-long syllables), develop a new alphabet where these different elements act as letters and then match it with the existing password database.

Finally, the hacker sets a threshold of occurrences that will be the basis of the next step and selects only the letters from the new alphabet that appear at least the minimum number of times, as chosen by the hacker. Then the method combines these into words of a maximum eight characters in length and utilizes the dictionary attack once again.

How to Secure Passwords

Since attacks can take many forms, the best way to protect yourself against hackers is to use long, unique passwords for every account. There are some easy tricks for creating strong passwords but, in the end, it all boils down to where and how you store those passwords.

It might be super-strong and the best password you have ever created, but if you write it down and store it somewhere, then it can easily be accessed by anyone who finds it. You can use any of the three secure password storage methods that we recommend, or use a password manager.

Best Password Managers of 2023

RankProviderInfoVisit
1
Editor's Choice 2023
RoboForm
  • Simple and straightforward client
  • Categorization of stored credentials
  • Biometric authentication
  • Versatile customer service
  • Review:
Visit RoboForm42% Off
2
Keeper
  • Fantastic security
  • Flexible platform
  • Reasonably priced
  • Easy-to-use
  • Review:
Visit
3
1Password
  • End-to-end encryption
  • Secure authentication method
  • Data breach alarms
  • One-time password support
  • Review:
Visit

Get the Best Deals on Password Managers

Subscribe to our monthly newsletter to get the best deals, free trials and discounts on password managers.

Thank you for subscribing please check your email account for confirmation email!
By subscribing to our newsletter you agree to our privacy policy and terms of use.
Tab title

Category: Articles

Share Your Comment Cancel reply

Your email address will not be published. Required fields are marked *

Best Password Managers

# 1RoboForm Reviews
# 2Keeper Reviews
# 31Password Reviews

Recent Articles

  • How Password Managers Keep Data Safe in a Breach
  • iCloud Keychain vs LastPass Comparison
  • iCloud Keychain vs 1Password Comparison
  • Will Passkeys Replace Passwords?
  • 3 Benefits of Using iCloud Keychain

Recent Articles

  • How Password Managers Keep Data Safe in a Breach
  • iCloud Keychain vs LastPass Comparison
  • iCloud Keychain vs 1Password Comparison
  • Will Passkeys Replace Passwords?
  • 3 Benefits of Using iCloud Keychain

More Info

  • Best Password Managers for Businesses
  • Best Password Managers for Families
  • Best Password Managers for Google Chrome
  • Best Password Managers for iPhone
  • Best Password Managers for Mac

Best Reviews

Best Reviews may receive compensation for its content through paid collaborations and/or affiliate links. Learn more about how we sustain our work and review products.

Best Reviews © 2023 · Privacy Policy · Terms of Use · Contact Us