Brute Force Attack Flashcards
Discovery
The payload of the attack is used to discover a hidden secret, example: discovering a password
Rate limiting
Technique to limit network traffic
Account lockout
Setting a max amount to put password incorrectly, and then locking account
Informed attack
Type of discovery attack, informed attack uses a known, good reference list of data set, example - credentials stuffing
Credential stuffing
Informed brute attack, can be id’s and passwords stole and sell on dark web
Brute force attack
Exhaustive approach to performing attack against a system, service or data set. Simple to implement. Almost always automated by script or a sequence of an operations in a loop. Can be online or offline, requires a lot of time and computing resources
Dictionary attack
Type of discovery attack, attacker uses a finite reference list or data set, example common passwords list
Attack conduct
The payload of attack is the conduct of the attack itself, DDOS.
IPS intrusion prevention system
Technique of brute force to determine and mitigate the attack. The goal is to see malicious activities
Rainbow table
Type of discovery attack, rainbow table attack uses a precomputed table of hashes to find original plaintext, example is password cracking
Workfactor
Is the estimate of time , effort and resources needed to adversary to succeed