HomeDefinitionsBrute Force: Definition and precautions to take

Brute Force: Definition and precautions to take

A brute force attack is a method of finding someone’s password or cryptographic key in order to gain access to an online service, personal data or computer.



Principle of the brute force attack

This very simple attack in principle consists of trying all possible combinations until you find the right one. A method of tremendous efficiency that no algorithm can resist.

The uncertainty of the success of a brute force attack lies in the time required to find the username. This variable depends both on the length of the password or encryption key and on the power of the computer hardware. A brute force attack can take minutes to years depending on the complexity of the code to be deciphered.

Different forms of Brute Force attack

There are various forms of brute force attack:

  • Dictionary attack: Automated tools rely on a dictionary file of common words and their variants in dialect, slang or with misspellings;
  • Rules-based attacks: use rules to test password variations using, for example, part of the username;
  • Attacks based on computing power: a personal computer is capable of testing hundreds of thousands of combinations per second; when this is no longer sufficient, the attackers can resort to distributed computing by making several machines work in concert; it also happens that hackers use botnets that they rent for the necessary time.

How to Prevent Brute Force

Use strong passwords

Only a strong password, the complexity of which could require several years of analysis, is likely to constitute effective protection.

It must combine lowercase and uppercase letters, numbers, special characters (example: ,?;.:/!§%µ) and/or national characters such as accented letters. It is also strongly advised to renew the passwords regularly and not to use the same one to secure various accesses.

In the case of an encryption key, the length, which is expressed in bits, determines the maximum number of operations necessary for decryption. In symmetric cryptography, 128-bit keys are considered the minimum required to ensure proper security.

Use a 2 factor Authentication (2FA) 

If the application or website allows you to activate a 2FA method, do not hesitate to use it. This method will be super hard for any hacker to get into your system.

Use a complex Username or login name

Another thing a hacker should find is your login username before trying to start a brute force. A complex username also makes it very difficult for hackers to break into your account.

Mehmet S. Kaya
Mehmet S. Kayahttps://teknonel.com
Mehmet is one of the administrator of Teknonel. As a software developer, he loves to share his knowledge in related topics. He is highly familiar with the editorial process from the inception of an article idea, through the iterative process, publishing, and performance analysis as well as product reviews.

Follow us on Social Media!

12FansLike
15,848FollowersFollow
13FollowersFollow
676SubscribersSubscribe

Related Articles

Hyperthreading: Definition, Uses and Importance

Threads are small tasks that the computer must perform simultaneously, that is to say operations that one or more open programs must execute and...

Geofencing: Definition, Uses and Importance

Geofencing is a geolocation technology that monitors the movement of objects or people within a predefined perimeter. This system is used, for example, for...

Firewall: Definition, Importance & Uses

A firewall is a computer tool (hardware and/or software) designed to protect network data (protection of a personal computer connected to the Internet for...

Electronic Data Interchange: Definition, Uses and Importance

Automated exchange of data between heterogeneous information systems, respecting universally accepted rules which make it possible to structure the data into messages.Electronic Data Interchange...

Explore More Articles

Best 300 - 350 Watt Power Supply Units-min

4 Best 300 – 350 Watt Power Supply Units

0
The power supply provides electrical current to all of the computer components. The power supply unit must have sufficient power to supply the various...

HDR: Definition, Advantages and Importance

0
HDR stands for "High Dynamic Range". The goal is to translate as well as possible, on a photo or a video, what the human...
The world's largest electric boat with a capacity of 2,100 people

The world’s largest electric boat with a capacity of 2,100 people

0
Electric vehicles can help reduce carbon emissions, so if ferries that are larger and use more fuel are electrified, can they further reduce carbon...