Section 17.160 Password Attacks Flashcards

Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.

1
Q

Password Attacks

A

Methods used by attackers to crack or recover passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of password attacks

Brute Force

A

Tries every possible character combination until the correct password is found

■ Effective for simple passwords but time-consuming for complex ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Brute Force Mitigation

A

● Increasing password complexity and length

● Limiting login attempts

● Using multi factor authentication

● Employing CAPTCHAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of password attacks

Dictionary

A

Uses a list of commonly used passwords (a dictionary) to crack passwords

■ May include variations with numbers and symbols

■ Effective against common, easy-to-guess passwords

Attacker Dictionaries are up to date using special characters etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dictionary Mitigation

A

Increase password complexity and length, limit login attempts, use multifactor authentication, and employ CAPTCHAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of password attacks

Password Spraying

A

A form of brute force attack that tries a few common passwords against many usernames or accounts

■ Effective because it avoids account lockouts and targets weak passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password Spraying Mitigation

A

Use unique passwords and implement multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of password attacks

Hybrid

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of password attacks

Hybrid Mitigation

A

Combines elements of brute force and dictionary attacks

■ May include variations, such as adding numbers or special characters to passwords

■ Can use a static dictionary or dynamically create variations

■ Effective for discovering passwords following specific patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly