How Passwords Are Cracked
Attackers use a variety of techniques to discover passwords, including using powerful tools freely available on the internet. The following advice makes password security easier for your users – improving your security as a result.
- Interception - Passwords can be intercepted as they are transmitted over a network.
- Brute Force - Automated guessing of billions of passwords until the correct one is found.
- Searching - IT infrastructure can be searched for electronically stored password information.
- Stealing Passwords - Insecurely stored passwords can be stolen – this includes handwritten passwords hidden close to a device.
- Key Logging - An installed keylogger intercepts passwords as they are typed.
- Manual Guessing - Personal information, such as name and date of birth can be used to guess common passwords.
- Shoulder Surfing - Observing someone typing their password.
- Social Engineering - Attackers use social engineering techniques to trick people into revealing passwords.