Anatomy of Password Hacking Ways

Find out how to protect your passwords by knowing how they are hacked. This article explains some of the methods of how password hacking programs work and how you can protect yourself.


There are many password hacking programs that are available today and some are very fast at cracking even the toughest passwords. How do these programs work and what are the underlying algorithms that they use to hack a password? This article looks at different methods of password hacking and how you can protect yourself from these attacks.

Encrypted Passwords

As many Web pages, operating system and other programs to use an encrypted password in their database and usually not the unencrypted password that will target for hackers actually save how to decrypt the password not to start the password. In many cases, “a way” encryption is means that it cannot be decrypted. To find out whether the password is the same as the encrypted one password type encrypted and also encryption hash is then stored hash encryption compared to see whether it is the same.

Brute Force Attacks

There are many password hacking programs out today and many are based on what is called a brute force attack. There are different kinds of brute force attacks that a program can use in order to hack a password. A brute force attack means trying different passwords to see if they are the same as the one we are trying to hack. Below are the three main types of attacks:

  • Dictionary Brute Force Attack
    A dictionary attack tries words that are common in everyday life like all the words from the dictionary. So if your password can be found in a dictionary, it can easily be cracked using a dictionary attack. There are specialized dictionary files for brute forcing passwords in each industry. For instance, a baseball fan may use a favorite players last name for a password and if the attacker uses a dictionary file that contains baseball players then the password may be compromised.
  • Hybrid Brute Force Attack
    A hybrid attack works much like a dictionary attack but it adds values to the password being sought. Such as the persons name with numbers behind it or before it, like john123 or 456pam.
  • Brute force attack
    A standard brute force attack is one of the slowest password hacking methods because it tries every single combination of passwords. For instance it would try “aa1”, “aa2”, “aa3”, and so on. It can be very time consuming for longer passwords and it is not a preferred method of password hacking.

Password Sniffing

Other programs simply hack passwords by capturing network traffic and finding the password strings. For example, if sent a site that SSL encryption is login password to the server as plain text. Who has can access to the network either wired or wirelessly to breathe your password. If your password is moved there is no way to know the attacker is something malicious to your account.

How To Protect Yourself

You can protect yourself from password hacking programs first of all by choosing a strong password. Your password should contain at least one of the following

  • Upper case letter
  • Lower case letter
  • Number
  • Special character

You should also make your password longer if you are allowed to. Having a password that is at least eight characters long is recommended. Other ways to protect yourself include turning on encryption in your wireless access point, changing passwords regularly, and using sites with SSL encryption whenever possible for logins.

  1. Hello, this is interesting reading, few months back I published something like this on my blog, but your article is much better.

Leave a Comment

× 3 = three

NOTE - You can use these HTML tags and attributes:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>