Struggling to tell your APIs from your CDNs? Read our comprehensive cloud computing glossary covering the most common terms.
< Back to glossary
A brute-force attack is a trial-and-error method used by attackers to gain unauthorized access to accounts or encrypted data. It involves systematically trying all possible combinations of passwords or keys until the correct one is found.
Target Identification: Attackers identify a target system or account they want to compromise (e.g., an email account or a login portal).
Password Guessing: Automated tools are used to test combinations of characters (letters, numbers, symbols) as potential passwords.
Common methods include dictionary attacks (using a list of likely passwords) or exhaustive key searches (trying every possible combination).
Access Attempt: The attack continues until the correct password is found or the system blocks further attempts.
Simple Brute Force: Tries every possible combination without any shortcuts or optimizations.
Dictionary Attack: Uses a predefined list of common passwords or phrases instead of random combinations.
Hybrid Attack: Combines dictionary attacks with variations like adding numbers or symbols to words.
Credential Stuffing: Uses stolen username-password pairs from previous breaches to attempt access on other platforms.
Unauthorized Access: Successful attacks can lead to compromised accounts or systems.
Data Theft or Loss: Attackers may steal sensitive information or delete critical data.
Service Disruption: Repeated login attempts can overload systems, causing downtime.
Strong Password Policies: Encourage users to create long, complex passwords that are harder to guess.
Account Lockout Mechanisms: Temporarily lock accounts after multiple failed login attempts.
Two-Factor Authentication (2FA): Adds an extra layer of security by requiring a second form of verification (e.g., OTPs).
CAPTCHAs: Prevent automated tools from attempting logins by requiring human interaction.
Attackers may use distributed networks (botnets) to bypass IP-based rate limiting.
Advanced tools can test millions of combinations in a short time using high computational power.
An attacker targets an online banking portal using a brute-force attack tool to guess user passwords. However, the bank’s system locks accounts after three failed attempts and requires additional verification via 2FA, thwarting the attack.