Attack Techniques
Types of Password Hash Attacks
1. Brute Force Attacks
A method of trying every possible combination of characters to crack a password hash.
## Example of a simple brute force tool (for educational purposes only)
sudo apt-get install john
john --format=sha256 password_hash.txt
2. Dictionary Attacks
Using a predefined list of common passwords to guess hash values.
graph LR
A[Dictionary] --> B[Hash Generation]
B --> C{Match?}
C -->|Yes| D[Password Cracked]
C -->|No| E[Try Next Word]
3. Rainbow Table Attacks
Precomputed tables of hash values for quick password recovery.
Attack Type |
Complexity |
Success Rate |
Brute Force |
High |
Low |
Dictionary |
Medium |
Medium |
Rainbow Table |
Low |
High |
4. Hybrid Attacks
Combining multiple techniques to increase chances of cracking hashes.
## Hybrid attack tool example
hashcat -a 6 -m 1400 hash.txt wordlist.txt ?d?d?d
Advanced Attack Techniques
5. GPU-Accelerated Cracking
Leveraging graphics processing units to dramatically speed up hash cracking.
## Check GPU capabilities
ubuntu-drivers devices
6. Social Engineering Approaches
Gathering password hints and personal information to inform attack strategies.
Mitigation Strategies
- Use strong, modern hashing algorithms
- Implement salting
- Use adaptive hashing functions
- Limit login attempts
At LabEx, we emphasize understanding these attack techniques to build more secure systems.