Skip to content
LogoTechnipages
LogoTechnipages
  • Topics
        • Android
        • Browsers
        • Gaming
        • Hardware
        • Internet
        • iPhone
        • Linux
        • macOS
        • Office
        • Reviews
        • Software
        • Windows
        • Definitions
        • All Recent Posts
  • Product Reviews
  • About

What is a Brute-Force Attack?

Mel HawthorneFebruary 27, 2023 Comments (0)
hacker attack

There are many extremely technical and sophisticated hacks out there. As you might be able to guess from the name, a brute-force attack, isn’t really all that. That isn’t to say that you should ignore them. As unsophisticated as they are, they can be very effective. Given enough time and processing power, a brute-force attack should always have a 100% success rate.

Contents

  • 1 Sub-classes
  • 2 Brute-forcing credentials
  • 3 Other types of brute-force attack
  • 4 Conclusion

Sub-classes

There are two main sub-classes: online and offline attacks. An online brute-force attack doesn’t necessarily involve the Internet. Instead, it is a class of attack that directly targets the running system. An offline attack can be performed without needing to interact with the system that’s under attack.

But how can you attack a system without attacking the system? Well, data breaches often contain lists of leaked usernames and passwords. Security advice though, recommends that passwords are stored in a hashed format. These hashes can only be cracked by guessing the right password. Unfortunately, now that the list of hashes is publicly available, an attacker can just download the list and try to crack them on their own computer. With enough time and processing power, this lets them know a list of valid usernames and passwords with 100% certainty before ever connecting to the affected site.

An online attack in comparison would try logging into the website directly. Not only is this a lot slower, but it’s also noticeable by pretty much any system owner that cares to look. As such, offline brute-force attacks are typically preferred by attackers. Sometimes, however, they may not be possible.

Brute-forcing credentials

The easiest class to understand and the most common threat is brute-forcing login details. In this scenario, an attacker literally tries as many combinations of usernames and passwords as possible to see what works. As covered above, in an online brute-force attack, the attacker may simply try entering as many combinations of username and password into the login form. This sort of attack generates a lot of traffic and failed login attempt errors which may be noticed by a system administrator who then may take action to block the attacker.

An offline brute-force attack revolves around cracking password hashes. This process literally takes the form of guessing every possible combination of characters. Given enough time and processing power, it would successfully crack any password using any hashing scheme. Modern hashing schemes designed for password hashing, however, have been designed to be “slow” and are typically tuned to take tens of milliseconds. This means that even with a huge amount of processing power, it will take many billions of years to crack a decently long password.

To try to increase the odds of cracking most passwords, hackers tend to use dictionary attacks instead. This involves trying a list of commonly used or previously cracked passwords to see if any in the current set have already been seen. Despite security advice to use unique, long, and complex passwords for everything, this strategy of a dictionary attack is typically very successful cracking roughly 75-95% of passwords. This strategy still takes lots of processing power and is still a type of brute-force attack, it’s just slightly more targeted than a standard brute-force attack.

Other types of brute-force attack

There are many other ways to use brute-force. Some attacks involve trying to gain physical access to a device or system. Typically an attacker will try to be stealthy about it. For example, they may try to stealthily pick-pocket a phone, they may try to pick a lock, or they may tailgate through an access-controlled door. Brute-force alternatives to these tend to be very literal, using actual physical force.

In some cases, some of a secret may be known. A brute-force attack can be used to guess the rest of it. For example, a few digits of your credit card number are often printed on receipts. An attacker could try all possible combinations of other numbers to work out your full card number. This is why most numbers are blanked out. The last four digits, for example, are enough to identify your card, but not enough for an attacker to have a decent chance of guessing the rest of the card number.

DDOS attacks are a type of brute-force attack. They aim to overwhelm the targeted system’s resources. It doesn’t really matter which resource. it could be CPU power, network bandwidth, or reaching a cloud processing price cap. DDOS attacks literally just involve sending enough network traffic to overwhelm the victim. It doesn’t actually “hack” anything.

Conclusion

A brute-force attack is a type of attack that involves relying on sheer luck, time, and effort. There are plenty of different types of brute-force attack. While some of them can involve somewhat sophisticated tools to carry out such as password-cracking software, the attack itself is not sophisticated. This does not mean that brute-force attacks are paper tigers though, as the concept can be very effective.

Categories: Hardware

Author Mel Hawthorne

You Might Also Like

  • order-iphone-covid-19

    How To Order iPhone During COVID-19 Lockdown

    MonaHardware
  • How To Set Up A Windows VPN

    Is a VPN Worth It? Do You Need One in 2020?

    Mel HawthorneHardware
  • What Is a Memory Barrier?

    Mel HawthorneHardware
  • codes

    What Are Computer Instructions?

    Mel HawthorneHardware

Leave a Reply

Your email address will not be published. Required fields are marked *

average laptop lifespan

What Is an Average Laptop Lifespan?

fix 0x80070302 windows update error

How to Fix the 0x80070302 Windows Update Error

how to allocate more memory to a program

How to Allocate More Memory to a Program in Windows

marvel rivals memory leak fix

Marvel Rivals Using Too Much Memory – How to Fix

how to create a macro in word

How to Create a Macro in Word

profile pic

The Experts Behind Technipages

My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

Learn More

technipages logo white
linkedin icon

Technipages is part of Guiding Tech Media, a leading digital media publisher focused on helping people figure out technology. Learn more about our mission and team here.

© 2025 Guiding Tech Media All Rights Reserved

  • About Us
  • Contact
  • Legal & Privacy

© 2025 Guiding Tech Media All Rights Reserved

Information from your device can be used to personalize your ad experience.
Do not sell my personal information.

Last Updated on February 27, 2023 by Mitch Bartlett