0
HomeDefinitionsBrute Force: Definition and precautions to take

Brute Force: Definition and precautions to take

A brute force attack is a method of finding someone’s password or cryptographic key in order to gain access to an online service, personal data or computer.



Principle of the brute force attack

This very simple attack in principle consists of trying all possible combinations until you find the right one. A method of tremendous efficiency that no algorithm can resist.

The uncertainty of the success of a brute force attack lies in the time required to find the username. This variable depends both on the length of the password or encryption key and on the power of the computer hardware. A brute force attack can take minutes to years depending on the complexity of the code to be deciphered.

Different forms of Brute Force attack

There are various forms of brute force attack:

  • Dictionary attack: Automated tools rely on a dictionary file of common words and their variants in dialect, slang or with misspellings;
  • Rules-based attacks: use rules to test password variations using, for example, part of the username;
  • Attacks based on computing power: a personal computer is capable of testing hundreds of thousands of combinations per second; when this is no longer sufficient, the attackers can resort to distributed computing by making several machines work in concert; it also happens that hackers use botnets that they rent for the necessary time.

How to Prevent Brute Force

Use strong passwords

Only a strong password, the complexity of which could require several years of analysis, is likely to constitute effective protection.

It must combine lowercase and uppercase letters, numbers, special characters (example: ,?;.:/!§%µ) and/or national characters such as accented letters. It is also strongly advised to renew the passwords regularly and not to use the same one to secure various accesses.

In the case of an encryption key, the length, which is expressed in bits, determines the maximum number of operations necessary for decryption. In symmetric cryptography, 128-bit keys are considered the minimum required to ensure proper security.

Use a 2 factor Authentication (2FA) 

If the application or website allows you to activate a 2FA method, do not hesitate to use it. This method will be super hard for any hacker to get into your system.

Use a complex Username or login name

Another thing a hacker should find is your login username before trying to start a brute force. A complex username also makes it very difficult for hackers to break into your account.

Post Gallery

Publish Date:

Mehmet S. Kaya
Mehmet S. Kayahttps://teknonel.com
Mehmet is one of the administrator of Teknonel. As a software developer, he loves to share his knowledge in related topics. He is highly familiar with the editorial process from the inception of an article idea, through the iterative process, publishing, and performance analysis as well as product reviews.

MUST Check

Related Articles

MPLS (Multi Protocol Label Switching): Definition, Uses and Importance

MPLS, also called Multi Protocol Label Switching, a mechanism that is used in telecommunications and computer networks. This technology is based on the switching...

HDR: Definition, Advantages and Importance

HDR stands for "High Dynamic Range". The goal is to translate as well as possible, on a photo or a video, what the human...

Keylogger: Definition, Prevention and Types

The term keylogger is used to designate any computer process (software or hardware) capable of recording the sequences of keys typed on a keyboard,...

Hyperthreading: Definition, Uses and Importance

Threads are small tasks that the computer must perform simultaneously, that is to say operations that one or more open programs must execute and...

Explore More Articles