How Passwords Are Cracked
Attackers use a variety of techniques to discover passwords, including using powerful tools freely available on the internet. The following advice makes password security easier for your users – improving your security as a result.
- Interception - Passwords can be intercepted as they are transmitted over a network.
 - Brute Force - Automated guessing of billions of passwords until the correct one is found.
 - Searching - IT infrastructure can be searched for electronically stored password information.
 - Stealing Passwords - Insecurely stored passwords can be stolen – this includes handwritten passwords hidden close to a device.
 - Key Logging - An installed keylogger intercepts passwords as they are typed.
 - Manual Guessing - Personal information, such as name and date of birth can be used to guess common passwords.
 - Shoulder Surfing - Observing someone typing their password.
 - Social Engineering - Attackers use social engineering techniques to trick people into revealing passwords.