Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Brute force attack

2,814 views

Published on

Published in: Technology
  • Be the first to comment

Brute force attack

  1. 1. Brute Force Attack<br />By GeorgiPeshev<br />
  2. 2. Overview<br /><ul><li> What is Brute Force Attack
  3. 3. Password Length Guesses
  4. 4. Brute Force Attack Limits
  5. 5. Unbreakable codes
  6. 6. Countermeasures
  7. 7. Questions
  8. 8. References</li></li></ul><li>What is Brute Force Attack<br /><ul><li>Part of cryptography
  9. 9. Attack used against passwords
  10. 10. Checks all possible keys
  11. 11. Depends on the key length </li></li></ul><li>Password Length Guesses<br /><ul><li>2 characters = 3,844 guesses because of:
  12. 12. First character: lower case letters (26) + upper case letters (26) + numbers (10) = 62
  13. 13. Second character: same = 62
  14. 14. Total permutations = 62*62 = 3,844</li></li></ul><li>Brute Force Attack Limits<br />
  15. 15. Unbreakable Codes<br /><ul><li>Protected by their mathematical properties
  16. 16. One-time Pad cryptography
  17. 17. Protected by the ability to generate random sequences of key bits
  18. 18. Can be defeated if not implemented correctly</li></li></ul><li>Countermeasures<br /><ul><li>Used by the administrators of databases and directories
  19. 19. Limiting number of password attempts
  20. 20. Restriction on IP address</li></li></ul><li>Questions<br />
  21. 21. References<br /><ul><li>http://www.hackosis.com/brute-force-attack/
  22. 22. http://en.wikipedia.org/wiki/Brute_force_attack</li>

×