expand for answer

Brute Force

An attack pattern characterized by a mechanical series of sequential or combinatorial inputs utilized in an automated attempt to identify security properties (usually passwords) in a given system (. See brute-force attack). The name given to a class of algorithms that repeatedly try all possible combinations until a solution is found.


Similar items:
A form of password attack in which a dictionary attack is first attempted and then a type of brute-force attack is performed. The follow-up brute-force attack is used to add prefix or suffix characters to passwords from the dictionary in order to discover one- upped constructed passwords, two-upped constructed passwords, and so on.
[view]
A function that returns a true value when only one of the input values is true. If both values are false or both values are true, the output of the XOR function is false. The XOR (exclusiveOR) gate acts in the same way as the logical “either/or. ” The output is “true” if either, but not both, of the inputs is “true. ” The output is “false” if both inputs are “false” or if both inputs are “true. ” Another way of looking at this circuit is to observe that the output is 1 if the inputs are different, but 0 if the inputs are the same. 0
[view]
An attack made against a system to discover the password to a known identity (in other words, username). A brute-force attack uses a systematic trial of all possible character combinations to discover an account’s password.
[view]
Devices that require that you read (or speed past) all of the data physically stored prior to the desired location. A common example of a sequential storage device is a magnetic tape drive.
[view]
A form of fuzzing that develops inputs based on models of expected inputs to perform the same task. This is also sometimes called intelligent fuzzing.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in