

The attacks this article discusses are dictionary attack, brute-force attack, hybrid attack, and rainbow table attack. Although many techniques are available these days to “de-hash the” password, that doesn’t effectively work all the time.Īttackers use various techniques to hack the password, like social engineering, network sniffing, keyloggers, brute-force, etc. An attacker can obtain the user password hash but cannot decrypt it into plain text. The best part of hashing is, it’s irreversible. However, Hashing uses unique random numbers to encrypt the plain text into unreadable form. And ciphertext decryption is simple to do within this technique. Within modern technology, passwords are protected in two ways: hashing and encryption.Įncryption is converting plain text into unreadable form (ciphertext). It also demonstrates various password cracking techniques by using Hydra in the Kali Linux. This article covers password cracking and hacking topics, including dictionary-based attacks, brute-force attacks, and rainbow table attacks.
