expand for answer

Brute-Force Attack

An attack made against a system to discover the password to a known identity (in other words, username). A brute-force attack uses a systematic trial of all possible character combinations to discover an account’s password.


Similar items:
An attack against a system designed to discover the password to a known identity (in other words, a username). In a dictionary attack, a script of common passwords and dictionary words is used to attempt to discover an account’s password.
[view]
A form of password attack in which a dictionary attack is first attempted and then a type of brute-force attack is performed. The follow-up brute-force attack is used to add prefix or suffix characters to passwords from the dictionary in order to discover one- upped constructed passwords, two-upped constructed passwords, and so on.
[view]
An attack pattern characterized by a mechanical series of sequential or combinatorial inputs utilized in an automated attempt to identify security properties (usually passwords) in a given system (. See brute-force attack). The name given to a class of algorithms that repeatedly try all possible combinations until a solution is found.
[view]
A method for downloading public files using the File Transfer Protocol. Anonymous FTP is called anonymous because users do not provide credentials before accessing files from a particular server. In general, users enter the word “anonymous” when the host prompts for a username; anything can be entered for the password, such as the user’s email address or simply the word “guest. ” In many cases, an anonymous FTP site will not even prompt for a name and password.
[view]
Authentication protocol that allows PPP peers to authenticate one another. The remote router attempting to connect to the local router is required to send an authentication request. Unlike CHAP, PAP passes the password and hostname or username in the clear (unencrypted). PAP does not itself prevent unauthorized access, but merely identifies the remote end. The router or access server then determines if that user is allowed access. PAP is supported only on PPP lines. Compare with CHAP.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in