Attacker as a little bit of the text ("crib") and then uses that to figure out what the other encrypted part is
. Uses precomputed hashes to guess passwords
. A hash that contains of bit of extra random information, so that it can't be found in a rainbow table
. Just just trying every known common word in hopes of cracking a password
. Uses every combination of characters to try to find the password, but done online and often slow and will get locked out after a certain number of tries
. Get a file of users and hashes and determine the calculation offline - very resource intensive for computing
. Same hash used for several different plaintexts; should never happen, hashes should always be unique
. Takes advantage of a mathematical probability
. Forcing a system to use a downgraded weaker form of security that can't protect against a more sophisticated attack
. Using weak encrypting standards WEP, DES, etc., poorly designed protection, etc - major problem here
.
|