Date First Published: 12th November 2023
Topic: Cybersecurity
Subtopic: Threats To Systems, Data & Information
Article Type: Computer Terms & Definitions
Difficulty: MediumDifficulty Level: 6/10
Learn about what password cracking is in this article.
Password cracking is the process of attempting to discover the correct passwords stored on a computer or a network. This is usually accomplished by guessing the password using an algorithm that enters password combinations until the correct password is discovered (brute-force attack). More common methods of password cracking, such as dictionary attacks, pattern checking, and word list substitution try to reduce the number of attempts required.
The time it takes to crack a password depends on:
Even a simple password can take several days to crack, so this method of discovering passwords is usually very time-consuming.
Password cracking is most commonly done for malicious purposes, like gaining unauthorised access to a system or electronic account to steal sensitive information for identity theft and fraud. However, not all password cracking is malicious. A non-malicious form of password cracking can be done when a user has forgotten their password and is trying to recover it. Sometimes, system administrators might perform tests on password strength as a form of security to check that attackers cannot easily access accounts and systems.
To prevent passwords from being cracked by unauthorised users, choosing strong passwords is recommended. An extra layer of security, like two-factor authentication is recommended so that even if the password was successfully cracked, the attacker would not be able to gain access.
A major password breach at Rockyou.com in December 2009 resulted in the release of 32 million passwords. Afterwards, the hacker exposed the complete list of 32 million passwords to the internet with no other identifiable information. Passwords were stored in plaintext and were extracted from the database using an SQL injection vulnerability.
A group calling itself "The Impact Team" stole Ashley Madison's user data in July 2015. Both the weaker MD5 hash and the more secure bcrypt method were used to hash a large number of passwords. Password cracking group CynoSure Prime was able to recover around 11 million plaintext passwords by exploiting the most recent algorithm.
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection