create account

The easiest hacking method - Brute force by krishtopa

View this thread on: hive.blogpeakd.comecency.com
· @krishtopa · (edited)
$47.14
The easiest hacking method - Brute force
# The easiest hacking method - Brute force

![](https://i.imgur.com/LyyMg4n.png)

*Brute force - one of the most popular methods of hacking passwords on servers and in various programs. Program-cracker tries to get access to a program (for example, to the mailbox) by brute force in accordance with the criteria specified by the owner of the program: dictionary, length, combinations of numbers, etc.*

----------

The program takes into account the minimum and maximum password length. It requires maximum system resources and takes a lot of time.

Brute force attack involves sequential selection (in other words hacking) of different characters until the necessary combination is selected. The rate of selection depends on the productivity of computer and complexity of the password, but the process can be performed in a linear time.

This method of password guessing is very good as in the end this password will be cracked, but it may take a very, very long time. So that this method of hacking is not always justified, if the user-owner of the hacked service acted quite cleverly, and didn’t use simple passwords like "123», «qwerty», but used both uppercase and lowercase letters, numbers, and special characters that are allowed. If the password is long enough (about 10 characters), then brute force hacking wouldn’t be dangerous.

![](https://i.imgur.com/Lzbb0mo.jpg)

During the development of various cryptographic ciphers, a total busting method is used in the evaluation of its resistance to cracking. This new code is considered to be sufficiently persistent if there is no faster method of hacking it than exhaustive search of all possible keys. Such cryptographic attacks, like brute force, are the most effective, but often take a very long time.

Dictionary attack is the most used type of brute force - the selection of passwords is made from a text file with a pre-compiled dictionary. This method of attack is very effective in mass hacking, for example, to hack an Internet messengers and ICQ accounts. At the same time, there is a fairly high probability that the attack by the dictionary wouldn’t succeed.

Since 2005, the number of attacks carried out on secure SSH-services significantly increased. Even if the server has the newest software, it does not mean that it is impossible to choose a password, especially if the firewall is inactive or is not configured correctly. So to increase the impossibility of hacking you need to configure the firewall properly, it will help protect the server from unpleasant surprises in the future.

![](https://i.imgur.com/34i3c9W.png)

*And finally, let's talk a little bit about the mathematical side of Brut force*

- In terms of knowing some methods of passwords Bruting, the screening of unacceptable values is used (blank passwords, the same recurring characters, etc.). In mathematics, this method is called the branch and bound method.
- Methods of parallel computing, when several passwords are sorted out, are also used in Brut force. This is accomplished in two ways: by conveyer method, and by the method of Brut force of disjoint subsets of all possible passwords.

---------

*Hacking by brute force method is quite slow, but powerful, so hackers use it to this day, and in view of the ever-increasing power of computers and bandwidth of Internet channels, it will be in service for a long time.*

***Remember that all the actions that are aimed at gaining unauthorized access to other people's information are illegal. All methods of brute force, which are described in this article may be used only to find vulnerabilities in the services that belong to you.***

References: [1](https://www.serializing.me/2015/08/12/ssh-brute-force-and-suricata/), [2](http://no-adware.com/blog/brute-force-password-cracker/)

*[Follow me](https://steemit.com/@krishtopa), to learn more about **popular science**, **math**, and **technologies***

**With Love,
Kate**

Image credit: [1](http://www.3ghax.net/2016/04/10-common-attacks-used-by-every-hacker.html), [2](https://www.serializing.me/2015/08/12/ssh-brute-force-and-suricata/), [3](http://no-adware.com/blog/brute-force-password-cracker/)
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 197 others
properties (23)
authorkrishtopa
permlinkthe-easiest-hacking-method-brute-force
categorypopularscience
json_metadata{"tags":["popularscience","science","it","security","technology"],"image":["https://i.imgur.com/LyyMg4n.png","https://i.imgur.com/Lzbb0mo.jpg","https://i.imgur.com/34i3c9W.png"],"links":["https://www.serializing.me/2015/08/12/ssh-brute-force-and-suricata/","http://no-adware.com/blog/brute-force-password-cracker/","https://steemit.com/@krishtopa","http://www.3ghax.net/2016/04/10-common-attacks-used-by-every-hacker.html"]}
created2016-10-30 14:58:48
last_update2016-10-30 18:28:18
depth0
children5
last_payout2016-11-30 16:54:24
cashout_time1969-12-31 23:59:59
total_payout_value44.067 HBD
curator_payout_value3.071 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length4,162
author_reputation48,350,480,258,009
root_title"The easiest hacking method - Brute force"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,652,218
net_rshares74,356,631,440,867
author_curate_reward""
vote details (261)
@englishtchrivy ·
@krishtopa is there any possibility to see the IP address - (real one) of the hacker?  Brute force gets reported via loginizer but I wonder if the IP address is actually for real cause some IP address points to huge companies and I wonder if they are actually the real hackers.
Great post - I followed you.
properties (22)
authorenglishtchrivy
permlinkre-krishtopa-the-easiest-hacking-method-brute-force-20161030t204458749z
categorypopularscience
json_metadata{"tags":["popularscience"],"users":["krishtopa"]}
created2016-10-30 20:44:57
last_update2016-10-30 20:44:57
depth1
children2
last_payout2016-11-30 16:54:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length306
author_reputation190,105,027,681,254
root_title"The easiest hacking method - Brute force"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,654,218
net_rshares0
@krishtopa ·
Most services now provide all logging data to the user, so you could figure out if the login was malicious. But most hackers use VPN and proxy, so IP address that you see tells almost nothing about the attacker
👍  
properties (23)
authorkrishtopa
permlinkre-englishtchrivy-re-krishtopa-the-easiest-hacking-method-brute-force-20161030t211943725z
categorypopularscience
json_metadata{"tags":["popularscience"]}
created2016-10-30 21:19:42
last_update2016-10-30 21:19:42
depth2
children1
last_payout2016-11-30 16:54:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length210
author_reputation48,350,480,258,009
root_title"The easiest hacking method - Brute force"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,654,429
net_rshares10,920,952,852
author_curate_reward""
vote details (1)
@englishtchrivy ·
@krishtopa - yes, I doubted about the IP address as well 
and most of the addresses lead to a huge online shopping name -
thank you for confirming that .
properties (22)
authorenglishtchrivy
permlinkre-krishtopa-re-englishtchrivy-re-krishtopa-the-easiest-hacking-method-brute-force-20161030t220642685z
categorypopularscience
json_metadata{"tags":["popularscience"],"users":["krishtopa"]}
created2016-10-30 22:06:48
last_update2016-10-30 22:06:48
depth3
children0
last_payout2016-11-30 16:54:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length153
author_reputation190,105,027,681,254
root_title"The easiest hacking method - Brute force"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,654,671
net_rshares0
@virtualgrowth ·
https://img1.steemit.com/192x192/https://s15.postimg.org/hlkpghmkr/Spot_light.png
[Included in Steemprentice Spotlight](https://steemit.com/steemprentice/@virtualgrowth/steemprentice-spotlight-sharing-steemit-stuff-and-skills) :)
http://www.onlinesignature.in/animateText/text785697588.gif
properties (22)
authorvirtualgrowth
permlinkre-krishtopa-the-easiest-hacking-method-brute-force-20161102t173348704z
categorypopularscience
json_metadata{"tags":["popularscience"],"image":["https://img1.steemit.com/192x192/https://s15.postimg.org/hlkpghmkr/Spot_light.png","http://www.onlinesignature.in/animateText/text785697588.gif"],"links":["https://steemit.com/steemprentice/@virtualgrowth/steemprentice-spotlight-sharing-steemit-stuff-and-skills"]}
created2016-11-02 17:33:48
last_update2016-11-02 17:33:48
depth1
children0
last_payout2016-11-30 16:54:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length289
author_reputation194,332,334,708,783
root_title"The easiest hacking method - Brute force"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,673,687
net_rshares0
@wisehammer ·
They mostly find it useful when there is no other chance like social engineering the admin side of the determinated website or most of them go search by the 0day exploits where they can decide to use them or resell them even.
👍  
properties (23)
authorwisehammer
permlinkre-krishtopa-the-easiest-hacking-method-brute-force-20161030t191244681z
categorypopularscience
json_metadata{"tags":["popularscience"]}
created2016-10-30 19:12:45
last_update2016-10-30 19:12:45
depth1
children0
last_payout2016-11-30 16:54:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length225
author_reputation2,502,745,411,790
root_title"The easiest hacking method - Brute force"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,653,700
net_rshares2,456,810,643
author_curate_reward""
vote details (1)