{"id":217,"date":"2018-01-21T09:15:39","date_gmt":"2018-01-21T09:15:39","guid":{"rendered":"https:\/\/www.imperva.com\/learn\/?post_type=application_security&#038;p=217"},"modified":"2023-12-20T15:42:09","modified_gmt":"2023-12-20T15:42:09","slug":"brute-force-attack","status":"publish","type":"application_security","link":"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/","title":{"rendered":"Brute Force Attack"},"content":{"rendered":"<h2>What is a Brute Force Attack<\/h2>\n<p>A brute force attack is a popular cracking method: by some accounts, brute force attacks accounted for five percent of confirmed security breaches. A brute force attack involves \u2018guessing\u2019 username and passwords to gain unauthorized access to a system. Brute force is a simple attack method and has a high success rate.<\/p>\n<p>Some attackers use applications and scripts as brute force tools. These tools try out numerous password combinations to bypass authentication processes. In other cases, attackers try to access web applications by searching for the right session ID. Attacker motivation may include stealing information, infecting sites with <a href=\"\/learn\/application-security\/malware-detection-and-removal\/\">malware<\/a>, or disrupting service.<\/p>\n<p>While some attackers still perform brute force attacks manually, today almost all brute force attacks today are performed by bots. Attackers have lists of commonly used credentials, or real user credentials, obtained via security breaches or the dark web. Bots systematically attack websites and try these lists of credentials, and notify the attacker when they gain access.<\/p>\n<h2>Types of Brute Force Attacks<\/h2>\n<ul>\n<li><strong>Simple brute force attack<\/strong>\u2014uses a systematic approach to \u2018guess\u2019 that doesn\u2019t rely on outside logic.<\/li>\n<li><strong>Hybrid brute force attacks<\/strong>\u2014starts from external logic to determine which password variation may be most likely to succeed, and then continues with the simple approach to try many possible variations.<\/li>\n<li><strong>Dictionary attacks<\/strong>\u2014guesses usernames or passwords using a dictionary of possible strings or phrases.<\/li>\n<li><strong>Rainbow table attacks<\/strong>\u2014a rainbow table is a precomputed table for reversing cryptographic hash functions. It can be used to guess a function up to a certain length consisting of a limited set of characters.<\/li>\n<li><strong>Reverse brute force attack<\/strong>\u2014uses a common password or collection of passwords against many possible usernames. Targets a network of users for which the attackers have previously obtained data.<\/li>\n<li><strong>Credential stuffing<\/strong>\u2014uses previously-known password-username pairs, trying them against multiple websites. Exploits the fact that many users have the same username and password across different systems.<\/li>\n<\/ul><h2>Hydra and Other Popular Brute Force Attack Tools<\/h2>\n<p>Security analysts use the THC-Hydra tool to identify vulnerabilities in client systems. Hydra quickly runs through a large number of password combinations, either simple brute force or dictionary-based. It can attack more than 50 protocols and multiple operating systems. Hydra is an open platform; the security community and attackers constantly develop new modules.<\/p>\n<div id=\"attachment_705\" style=\"width: 892px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-705\" class=\"wp-image-705 size-full\" src=\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2018\/01\/hydra-brute-force-attack.png\" alt=\"Hydra brute force attack\" width=\"882\" height=\"362\" srcset=\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2018\/01\/hydra-brute-force-attack.png 882w, https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2018\/01\/hydra-brute-force-attack-300x123.png 300w, https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2018\/01\/hydra-brute-force-attack-768x315.png 768w\" sizes=\"auto, (max-width: 882px) 100vw, 882px\" \/><p id=\"caption-attachment-705\" class=\"wp-caption-text\">Hydra brute force attack<\/p><\/div>\n<h3>Other top brute force tools are:<\/h3>\n<ul>\n<li><strong>Aircrack-ng<\/strong>\u2014can be used on Windows, Linux, iOS, and Android. It uses a dictionary of widely used passwords to breach wireless networks.<\/li>\n<li><strong>John the Ripper<\/strong>\u2014runs on 15 different platforms including Unix, Windows, and OpenVMS. Tries all possible combinations using a dictionary of possible passwords.<\/li>\n<li><strong>L0phtCrack<\/strong>\u2014a tool for cracking Windows passwords. It uses rainbow tables, dictionaries, and multiprocessor algorithms.<\/li>\n<li><strong>Hashcat<\/strong>\u2014works on Windows, Linux, and Mac OS. Can perform simple brute force, rule-based, and hybrid attacks.<\/li>\n<li><strong>DaveGrohl<\/strong>\u2014an open-source tool for cracking Mac OS. Can be distributed across multiple computers.<\/li>\n<li><strong>Ncrack<\/strong>\u2014a tool for cracking network authentication. It can be used on Windows, Linux, and BSD.<\/li>\n<\/ul>\n<h2>Weak Passwords that Enable Brute Force Attacks<\/h2>\n<p>Today, individuals possess many accounts and have many passwords. People tend to repeatedly use a few simple passwords, which leaves them exposed to brute force attacks. Also, repeated use of the same password can grant attackers access to many accounts.<\/p>\n<p>Email accounts protected by weak passwords may be connected to additional accounts, and can also be used to restore passwords. This makes them particularly valuable to hackers. Also, if users don\u2019t modify their default router password, their local network is vulnerable to attacks. Attackers can try a few simple default passwords and gain access to an entire network.<\/p>\n<p>Some of the most commonly found passwords in brute force lists include: date of birth, children\u2019s names, qwerty, 123456, abcdef123, a123456, abc123, password, asdf, hello, welcome, zxcvbn, Qazwsx, 654321, 123321, 000000, 111111, 987654321, 1q2w3e, 123qwe, qwertyuiop, gfhjkm.<\/p>\n<p>Strong passwords provide better protection against identity theft, loss of data, unauthorized access to accounts etc.<\/p>\n<h2>How to Prevent Brute Force Password Hacking<\/h2>\n<p>To protect your organization from brute force password hacking, enforce the use of strong passwords. Passwords should:<\/p>\n<ul>\n<li>Never use information that can be found online (like names of family members).<\/li>\n<li>Have as many characters as possible.<\/li>\n<li>Combine letters, numbers, and symbols.<\/li>\n<li>Be different for each user account.<\/li>\n<li>Avoid common patterns.<\/li>\n<\/ul>\n<p>As an administrator, there are methods you can implement to protect users from brute force password cracking:<\/p>\n<ul>\n<li><strong>Lockout policy<\/strong>\u2014you can lock accounts after several failed login attempts and then unlock it as the administrator.<\/li>\n<li><strong>Progressive delays<\/strong>\u2014you can lock out accounts for a limited amount of time after failed login attempts. Each attempt makes the delay longer.<\/li>\n<li><a href=\"https:\/\/www.imperva.com\/learn\/application-security\/what-is-captcha\/\"><strong>Captcha<\/strong><\/a>\u2014tools like reCAPTCHA require users to complete simple tasks to log into a system. Users can easily complete these tasks while brute force tools cannot.<\/li>\n<li><strong>Requiring strong passwords<\/strong>\u2014you can force users to define long and complex passwords. You should also enforce periodical password changes.<\/li>\n<li><a href=\"\/learn\/application-security\/2fa-two-factor-authentication\/\"><strong>Two-factor authentication<\/strong><\/a>\u2014you can use multiple factors to authenticate identity and grant access to accounts.<\/li>\n<\/ul>\n<div class=\"ddos-banner\"><div class=\"wrap\"><p>See how Imperva Bot Management can help you with brute force attacks.<\/p>\n<div class=\"cta-container\">\n                                                    <a class=\"impv-yellow-btn\"  event-action=\"Click\"  event-category=\"LC Banner\"  event-label=\"Request demo\"  gtm-track  target=\"_self\" href=\"javascript:openModal('modalid3533', '\/learn\/banner\/virtual\/request-demo\/', 'Personal Demo Request | Imperva');\">Request demo<\/a>\n                                                    <a class=\"gst-yellow-dark-text-btn\"  event-action=\"Click\"  event-category=\"LC Banner\"  event-label=\"Learn more\"  gtm-track  target=\"_self\" href=\"https:\/\/www.imperva.com\/products\/bot-management\/\">Learn more<\/a>\n                                                <\/div><\/div><\/div><h2>Brute Force Attack Prevention with Imperva<\/h2>\n<p><a href=\"\/products\/bot-protection\/\">Imperva Bot Protection<\/a> monitors traffic to your website, separating bot traffic from real users and blocking unwanted bots. Because almost all brute force attacks are carried out by bots, this goes a long way towards mitigating the phenomenon.<\/p>\n<p>Bot Protection follows three stages to identify bad bots. It classifies traffic using a signature database with millions of known bot variants. When identifying a suspected bot, it performs several types of inspection to classify the bot as legitimate, malicious or suspicious. Finally, suspicious bots are challenged, to see if they can accept cookies and parse Javascript.<\/p>\n<p><a href=\"\/products\/web-application-firewall-waf\/\">Imperva WAF<\/a> also protects against manual brute force attacks. When a user makes repeated attempts to access a system, or successively attempts different credentials following a pattern, Imperva will detect this anomalous activity, block the user and alert security staff.<\/p>\n","protected":false},"featured_media":0,"template":"","categories":[3],"class_list":["post-217","application_security","type-application_security","status-publish","hentry","category-attack-types"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is a Brute Force | Common Tools &amp; Attack Prevention | Imperva<\/title>\n<meta name=\"description\" content=\"A brute force is a popular passwords cracking method. Learn about common brute force bots, tools and ways of attack prevention.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Brute Force | Common Tools &amp; Attack Prevention | Imperva\" \/>\n<meta property=\"og:description\" content=\"A brute force is a popular passwords cracking method. Learn about common brute force bots, tools and ways of attack prevention.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Learning Center\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-20T15:42:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2018\/01\/hydra-brute-force-attack.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Itamar Verta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/\",\"url\":\"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/\",\"name\":\"What is a Brute Force | Common Tools & Attack Prevention | Imperva\",\"isPartOf\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2018\/01\/hydra-brute-force-attack.png\",\"datePublished\":\"2018-01-21T09:15:39+00:00\",\"dateModified\":\"2023-12-20T15:42:09+00:00\",\"description\":\"A brute force is a popular passwords cracking method. Learn about common brute force bots, tools and ways of attack prevention.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/#primaryimage\",\"url\":\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2018\/01\/hydra-brute-force-attack.png\",\"contentUrl\":\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2018\/01\/hydra-brute-force-attack.png\",\"width\":882,\"height\":362,\"caption\":\"Hydra brute force attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.imperva.com\/learn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AppSec\",\"item\":\"https:\/\/www.imperva.com\/learn\/application-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Brute Force Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.imperva.com\/learn\/#website\",\"url\":\"https:\/\/www.imperva.com\/learn\/\",\"name\":\"Learning Center\",\"description\":\"Imperva\",\"publisher\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.imperva.com\/learn\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.imperva.com\/learn\/#organization\",\"name\":\"Imperva Inc\",\"url\":\"https:\/\/www.imperva.com\/learn\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.imperva.com\/learn\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg\",\"contentUrl\":\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg\",\"width\":1200,\"height\":627,\"caption\":\"Imperva Inc\"},\"image\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Brute Force | Common Tools & Attack Prevention | Imperva","description":"A brute force is a popular passwords cracking method. Learn about common brute force bots, tools and ways of attack prevention.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/","og_locale":"en_US","og_type":"article","og_title":"What is a Brute Force | Common Tools & Attack Prevention | Imperva","og_description":"A brute force is a popular passwords cracking method. Learn about common brute force bots, tools and ways of attack prevention.","og_url":"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/","og_site_name":"Learning Center","article_modified_time":"2023-12-20T15:42:09+00:00","og_image":[{"url":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2018\/01\/hydra-brute-force-attack.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes","Written by":"Itamar Verta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/","url":"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/","name":"What is a Brute Force | Common Tools & Attack Prevention | Imperva","isPartOf":{"@id":"https:\/\/www.imperva.com\/learn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2018\/01\/hydra-brute-force-attack.png","datePublished":"2018-01-21T09:15:39+00:00","dateModified":"2023-12-20T15:42:09+00:00","description":"A brute force is a popular passwords cracking method. Learn about common brute force bots, tools and ways of attack prevention.","breadcrumb":{"@id":"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/#primaryimage","url":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2018\/01\/hydra-brute-force-attack.png","contentUrl":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2018\/01\/hydra-brute-force-attack.png","width":882,"height":362,"caption":"Hydra brute force attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.imperva.com\/learn\/application-security\/brute-force-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.imperva.com\/learn\/"},{"@type":"ListItem","position":2,"name":"AppSec","item":"https:\/\/www.imperva.com\/learn\/application-security\/"},{"@type":"ListItem","position":3,"name":"Brute Force Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.imperva.com\/learn\/#website","url":"https:\/\/www.imperva.com\/learn\/","name":"Learning Center","description":"Imperva","publisher":{"@id":"https:\/\/www.imperva.com\/learn\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.imperva.com\/learn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.imperva.com\/learn\/#organization","name":"Imperva Inc","url":"https:\/\/www.imperva.com\/learn\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.imperva.com\/learn\/#\/schema\/logo\/image\/","url":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg","contentUrl":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg","width":1200,"height":627,"caption":"Imperva Inc"},"image":{"@id":"https:\/\/www.imperva.com\/learn\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/application_security\/217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/application_security"}],"about":[{"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/types\/application_security"}],"version-history":[{"count":6,"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/application_security\/217\/revisions"}],"predecessor-version":[{"id":1755,"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/application_security\/217\/revisions\/1755"}],"wp:attachment":[{"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/media?parent=217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/categories?post=217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}