Computing Magazine

Common Password Cracking Techniques and How to Safeguard Against Them

Posted on the 30 January 2017 by Dreamtechie

If you think your passwords are secure just because they're personal to you and you haven't written them down anywhere, think again. Many people don't realise that cracking passwords is nowhere near as hard as you think. In fact, there are scores of cyber criminals and legitimate internet security experts out there who can make short work of most passwords.

There are a number of common techniques that are used to crack most passwords, and we, naively, make our accounts vulnerable by making it easy for the hackers. Here's how it works.

Guessing

According to an annual review of the worst passwords, the list of far-too-simple passwords includes password, 123456 (and similar variations), qwerty, abc123, access, letmein, trustno1 and similarly obvious choices. If your password is among these, you should change it without delay.

When choosing a password - and the same goes for 'password forgotten' security questions - don't ever use private information such as your name, birthday, children's or pet's names or birthdays, nor your favourite song, sport, colour or anything else that is personal to you.

All of these can be deduced with a little research into your private life, which may well be accessible for all to see on Facebook! You have been warned.

Dictionary Attacks

When selecting a good password, avoid the following: consecutive keyboard combinations (qwerty, asdf), words that can be found in the dictionary, including words spelled backwards, slang words, common misspellings.

Common password cracking techniques and how to safeguard against them

All of these, and including any numbers you place before or after, can be cracked easily using specially designed software programmes such as John the Ripper. The software automatically plugs common words into password fields.

Brute Force

Brute Force password access are always successful, eventually. Nothing particularly clever about these attacks, the software simply systematically tries every combination until it finds the right one.

The longer the password to crack, the more time it will take to discover the correct combination of characters. The complexity of the search is also increased by the use of upper and lower case letters, other keyboard symbols and the creativity of the password setter. The best passwords will take years to crack, but Brute Force software is getting quicker all the time...

Do check - Top 7 Best Password Manager Apps Android

Multiple Uses

According to the Center for Internet Security, somewhere between a third and half of users use the same password for multiple sites. If you're using the same password for several services - email, banking, social media accounts etc. - you are laying yourself wide open to security breaches on several accounts, and also to wider identity theft. Avoid this at all cost.

Common password cracking techniques and how to safeguard against them

Security breaches happen with alarming frequency these days. LinkedIn was breached in 2012, Tumblr in 2013 and MySpace in June2016. Even Mark Zuckerberg had his Twitter and Pinterest accounts compromised. Just imagine the damage that can be inflicted by an unauthorised user in possession of your username, password, email address and other personal information, and take preventative action now.

Keeping your passwords safe

Once you've understood the importance of setting a strong password for each of your account, the next task is to make sure they're kept in a safe place. Of course, the advice is to never keep a record of your password for security reasons, but this is becoming increasingly unfeasible in our digital world. How are you going to remember them all? In fact, chances are that if you can remember each of your passwords, they're too easy to crack.

Most users keep lists or files with log in information for all their online accounts. If this is your choice of password storage, the most secure place to keep such a list is on an external flash drive that you have with you at all times.

Another excellent solution is a password manager - software that will store all your passwords, generate secure new passwords and sync them across your devices. PC Magazine has a recent review of the best password managers currently on the market here. It may feel risky entrusting all your most sensitive information to one service, typically a browser plug-in, but in this security driven digital world, password managers are the safest option around. Another advantage of using a password manager is that the software can generate secure random passwords that are better than anything you can come up with yourself.

You may also like -

Finally, the best password in the world is rendered useless if someone watches you key it in. Keyloggers are computer programs that can log your keystrokes as you type them, transmitting the information to a would-be cyber criminal. Double check the security programs on your computer and be extra vigilant on public or shared computers.


You Might Also Like :

Back to Featured Articles on Logo Paperblog

These articles might interest you :

  • IIIT Delhi Placement Analysis

    IIIT Delhi Placement Analysis

    IIIT Delhi is a Delhi based technical university which is creating the buzz for last few years in the country in terms of placement, education culture, faculty... Read more

    6 hours, 3 minutes ago by   Ssankarr
    TECH
  • Heavy Rockers, Ozone Mama, Announce New Headlining European Tour and Welcome...

    Heavy Rockers, Ozone Mama, Announce Headlining European Tour Welcome Singer

    Big things are bristling on the horizon for Ripple Music's, Ozone Mama!After releasing their critically acclaimed, best-selling album, "Cosmos Calling" with... Read more

    9 hours, 5 minutes ago by   Ripplemusic
    ENTERTAINMENT, MUSIC
  • Train Travels: Malaysia to Thailand

    Train Travels: Malaysia Thailand

    I have now covered this route a bunch of times through the years, having travelled overland from as far as Singapore, up to the... Read more

    9 hours, 24 minutes ago by   Allanmwilson
    DESTINATIONS, EXPAT, TRAVEL
  • Random Bits of Nature (Snake Warning)

    Random Bits Nature (Snake Warning)

    A very tiny toad -- less than in inch. Blacksnakes kill by constriction. This was an ex-chipmunk by the time I saw it. Read more

    10 hours, 35 minutes ago by   Vickilane
    CREATIVITY, PHOTOGRAPHY
  • Duck Duck Go Founder Asks Google to Sell Them Duck.com

    Duck Founder Asks Google Sell Them Duck.com

    So there was an interesting article on CNET today about Duck.com. Google acquired the domain back in 2010 when they acquired ON2. But there is confusion, most... Read more

    11 hours, 7 minutes ago by   Worldwide
    BUSINESS, TECH
  • Concert Review: A Grand Night for D Major

    Concert Review: Grand Night Major

    Michael Tilson Thomas conducts the National Youth Orchestra.</> by Paul J. Pelkonen The players wore red pants: The National Youth Orchestra.Photo © 2018... Read more

    16 hours, 39 minutes ago by   Superconductor
    CULTURE, THEATRE & OPERA
  • OMG - OH My Greenery 24x7

    Greenery 24x7

    Here OMG stands for Office, Home, Market Yard, and Ground. These places by the human being created to secure their social activities. Mostly human destroy the... Read more

    16 hours, 53 minutes ago by   Saurabh Verma
    A-CLASSER
By Sofia Hambly
posted on 05 June at 11:30

In the World of Internet privacy, the major thing is that to protect your personal data through password but some bad identities continuously active and try to steal your password and identity. By the use of VPN you can easily secure your privacy and hide your identity from attackers. Here you can find the list of best VPNs https://www.reviewsdir.com/best-vpn-services/

Magazines