brute force attack
brute force attack
FORCE
ATTAC
What is Brute Force
Attack?
A hacking method that uses trial and error to
crack passwords, login credentials, and
encryption keys.
OF
Attacks
Dictionary
Attacks
FORCE
Reverse Brute Force
Attack
Credential
ATTACK
Stuffing
Simple Brute Force
Hacker attempts to Attacks
guess a user’s login Dictionary
credentials manually Attacks
without using any Hybrid Brute Force
Attacks
software but through
standard password Reverse Brute Force
Attack
combinations or PIN
Credential
codes. Stuffing
Simple Brute Force
Basic form of brute Attacks
force hacking in Dictionary
which the attacker Attacks
selects a target, then Hybrid Brute Force
Attacks
tests possible
passwords against Reverse Brute Force
Attack
that individual’s
Credential
username. Stuffing
Hacker use the
Simple Brute Force
combination of Attacks
dictionary attack Dictionary
method with a simple Attacks
brute force attack. Hybrid Brute Force
They blend outside Attacks
means with their Reverse Brute Force
Attack
logical guesses to
attempt a break-in. Credential
Stuffing
Simple Brute Force
Hacker reverses the Attacks
attack strategy by Dictionary
starting with a Attacks
known password Hybrid Brute Force
Attacks
then search millions
of usernames until Reverse Brute Force
Attack
they find a match.
Credential
Stuffing
Attackers collect Simple Brute Force
username and Attacks
password Dictionary
combinations they Attacks
have stolen, which Hybrid Brute Force
Attacks
they then test on
other websites to see Reverse Brute Force
Attack
if they can gain
Credential
access to additional Stuffing
user accounts.
How Do Brute Force Attack
Work?
Hackers can use manual processes or
automated software to infiltrate a private
network. They may already have access to
certain information before they begin their
attempts.
5% of all data breaches are caused by
brute force attacks. Breaches caused by
hacking,
80% involve brute force or lost/stolen cr
POPULAR
BRUTE John the Ripper
FORCE Aircrack-ng
ATTACK Hashcat
TOOLS
Open-source software that lets John the Ripper
users run dictionary attacks and
detect weak passwords through
various cracking and decryption Aircrack-ng
techniques.
Hashcat
An open-source tool that John the Ripper
focuses on penetration testing
for wireless network security Aircrack-ng
through dictionary attacks
against network protocols.
Hashcat
A penetration testing platform
that lets hackers use known John the Ripper
"hashes," a password that's run
through a formula and Aircrack-ng
converted to a string of random
characters that is always the
same length regardless of how Hashcat
much data the password
contains.
REAL-
LIFE Dunkin’ Donuts Case
OF 2012 LinkedIn
Incident
BRUTE
DUNKIN’ DONUTS PAYS OVER HALF A MILLION
IN PENALTIES
In a famous 2015 incident
involving the use of brute force,
Dunkin’ Donuts digital customer Dunkin’ Donuts Case
accounts were targeted by
hackers who used a leaked list
Compromised Alibaba
of previously stolen credential Account
information and ran brute force
algorithms. They gained access 2012 LinkedIn
to 19,715 user accounts for the Incident
customer loyalty application
and stole tens of thousands of
dollars of rewards cash.
HOW DID DUNKIN
RESPONSE?
Dunkin’ Donuts initiated an
internal investigation to
understand the extent of the Dunkin’ Donuts Case
breach and the methods used by
the attackers. Compromised Alibaba
Account
Affected users were notified
2012 LinkedIn
about the breach and the Incident
unauthorized access to their
accounts.
WHAT MITIGATION METHOD DID THEY USED?
Password Resets
FORCE
ATTACK
ASSESS THE BREACH
Identify the Scope
Determine what data was compromised
and how the breach occurred.
Immediate Actions
Contain the Breach
Take immediate steps to secure systems
and prevent further unauthorized access.
Mitigation Approach
NOTIFY AFFECTED PARTIES
Long-Term Strategies
User Notification
Inform affected users promptly about the
breach, detailing what information was
compromised and what steps they should
take.
Regulatory Compliance
Notify relevant government agencies.
CONDUCT AN Immediate Actions
INVESTIGATION
Internal Review
Launch a thorough investigation to
understand the breach's cause and assess Mitigation Approach
vulnerabilities.
Patch Vulnerabilities
Address any identified weaknesses in Mitigation Approach
software or systems immediately
USER EDUCATION
Long-Term Strategies
Provide Resources
Offer guidance to users on creating strong
passwords and recognizing phishing
attempts.
Compensation Consideration
Mitigation Approach
Evaluate the possibility of offering
compensation or services to affected users
as a goodwill gesture, if feasible. Long-Term Strategies
LEGAL ACTION
Pursue Legal Recourse
If applicable, work with law enforcement to
investigate the breach and pursue legal
action against the perpetrators.