Common Types of Password Attacks

Learn about five common types of password attacks, from brute force to credential stuffing. Protect your accounts with strong, unique passwords, and enable 2FA!

  1. Brute Force Attack: Hackers use automated software to try every combination of characters until they find the right one. This is very effective if the password is short or weak, but very time-consuming if it’s long and complex.
  2. Dictionary Attack: Using a list of common words or previously leaked passwords, attackers try each word one by one. This is faster than brute force because it focuses only on the most common possibilities.
  3. Rainbow Table Attack: Utilizing a pre-computed hash table to match a stolen hash. With a rainbow table, hackers can find the original password more quickly if the database doesn’t use salting.
  4. Keylogger: Malware or hardware that records every user keystroke. When the victim types a password, it is immediately recorded and becomes available to the attacker.
  5. Social Engineering (including Phishing): Hackers trick victims into entering their passwords using fake websites or emails that appear legitimate, and then store all the information for misuse.
  6. Credential Stuffing: Criminals use leaked credentials from one platform (username + password) and attempt automated logins to other services. This is effective because many people use the same passwords across multiple sites.

Protection Tips:

  1. Use a combination of long, unique, and random passwords (or passphrases).
  2. Enable two-factor authentication (2FA/MFA) on important accounts.
  3. Avoid reusing passwords across different platforms.
  4. Ensure your system implements modern hashing with salt, such as bcrypt or Argon2.
  5. Limit the number of failed login attempts (account lockout) to prevent brute-force attacks or credential stuffing.

Share:

More Posts

Eid Al-Fitr Mubarak

The Directorate of Information Systems and Technology at Diponegoro University wishes you a Happy Eid