Top 5 Password Cracking/hacking techniques Used By hackers Now days

techniques used by hackers 
Welcome to Trickshub Tutorials. Today I am Going to share you the complete list of techniques which are used by hackers to crack your passwords. Techniques which I am Going to Share With your are mostly used by hackers who have bad intention mostly .

Cyber Security advised us to use long passwords but it doesn’t teach us how to easily identify the hackers hacking into your computers. There is always be an option for hackers to crack your passwords though you are creating strong passwords.


Top 5 Password Cracking Techniques Mostly Used By Hackers 

              Dictionary attack is used by hackers to determine the passphrase by trying their luck many times. This techniques is mostly used by hackers and is most popular now a days. It works Like a dictionary. It is just a simple file which contains lots of combinations of words and numbers or we can say it as unusual words . It is easiest technique to hack anyone’s account . But by putting strong password this technique may not work.

              The main use of this brute Force attack is to crack your passwords. It tries to level best and try every possible combinations until the password is found. But now a days peoples becomes smarter and the growing size of the passwords making bruteforce Attack difficult to crack your password. It is much similar as Dictionary Attack but it is more powerful that the dictionary attack.

              Many of you might be well known about the Phishing Attack. You may have listen that many hackers use Phishing techniques to hack facebook passwords.  Phishing is the easiest way to hack anyone’s passwords used by hackers. I does nothing it is simply ask users for their passwords but the process of asking password is unique and different . Hackers used to create similar fake pages , fake apps, fake emails etc . It simply asked you to login with your ID and Password and these details are stored into hacker’s server.

              These programs are developed by hackers for the purpose of generating the target  destruction. Trojan Viruses are usually added to the user’s system so that they can make full access of the user’s system. 

              Shoulder surfing is the way of practicing of spying on the user of a cash-dispensing machine or other types of electronic devices to gain the personal ID numbers , passwords, etc. It is mostly found in the eye catching notes stuck in front of your LCD monitor .

   This question is challenging now a days. No one can claim that passwords can not be hacked. Even if you use all possible security  systems it is sure that there is at least a hole that can be exploited. The best way of being safe from hackers is still acting sparingly and carefully. But you can do two step verifications methods in Facebook and emails  which makes many techniques failure now a days .


Share on Google Plus

About Ranjit Shrestha

Hi.. This is me Ranjit Shrestha . I am currently working on my youtube channel : Ranjit Tech Nepal . I am blogger,web designer, youtuber, programmer as well as learner. I have cleared my +2 from Liverpool International college, New baneshwor ,Kathmandu taking science as major subject. Now I am currently studying Bsc. Csit .
    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment