Finally, some ideas on how to properly secure yourself and your systems from the possibility of a password cracking attack were offered.
最后,提供了有关如何适当保护您自己和您的系统避免可能受到密码破解攻击的一些想法。
This type of attack is only possible if the database or password store is already compromised.
这种类型的攻击只可能在数据库或密码存储已经暴露的情况下进行。
Dictionary attack — Guessing the password of a valid user using a brute force search through dictionary words.
字典攻击——根据字典词汇,使用蛮力搜索的方式推测一个有效用户的密码。
Another common attack is to guess a user's password.
另一种常用的攻击是猜测用户的密码。
A hybrid attack will add numbers or symbols to the filename to successfully crack a password.
混合攻击将数字和符号添加到文件名以成功破解密码。
This attack USES password cracking to penetrate the systems that the attacker wants to deface.
这一攻击使用密码破解来渗透攻击者想破坏的系统。
A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password.
蛮力攻击是最全面的攻击形式,虽然它通常需要很长的时间工作,这取决于密码的复杂程度。
When trying to attach over the Internet to the site, the attacker USES a password generator tool, such as L0phtCrack, which launches a brute force attack against the server.
当试图通过因特网连接到该站点时,攻击者使用一个密码发生器工具(如l0phtcrack),它启动对服务器的蛮力攻击。
This is known as a dictionary attack, and it's one of the many good reasons why your password shouldn't be password or the name of a Star Trek character or even your dog's name.
这也称为字典攻击,因此您的密码最好不应该是密码或Startrek字符名,甚至您的呢称。
Just because you encrypt Fido and it becomes gibberish doesn't mean your password is safe from this kind of attack.
因为在加密Fido后,它会变成一堆乱语,但这并不表明它对于此种攻击是安全的。
To wit, e-mail, remote login, and superuser privileges all require a password—preferably disparate and each difficult to guess or derive using an automated attack.
电子邮件、远程登录和超级用户特权都需要密码,这些密码最好各不相同而且难以通过自动化攻击猜测或推断出来。
But it is possible to attack the hashed value of your password using rainbow tables: enormous, pre-computed hash values for every possible combination of characters.
但是有可能通过rainbow表去攻击密码的hash值:预先计算出来的数量庞大的hash值,涵盖所有可能的字符组合。
Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc.
恶意用户能够使用PaddingOracle (PO)攻击方式来解密cookie,加密状态及认证密码等关键信息。
Some 73% of Internet bank clients in the US share their online banking password with non-financial sites, sharply increasing the risk of attack to their bank account, a poll said.
最新调查显示,美国约73%的网上银行用户使用同一个密码在网银和其他网站注册个人信息,极大提高了银行账户被攻击的风险。
"We tend to think of password guessing as a very time-consuming attack in which I take each account and try a large number of name-and-password combinations," Mr. Shulman said.
Shulman先生说:“我们往往认为破译密码非常耗时,需要逐个尝试密码和用户名的组合。”
If someone wanted to attack a transaction, they could get everything they need at the ISP level, without breaking an encrypted password.
如果有人要攻击一次交易,他不要破译加密的口令就能在IS P层面上得到所需的一切。
By using these schemes, computer system can not only supervises and controls all passwords, but also withstand all attack of forging password.
利用这些方案,计算机系统不仅能监测和控制口令的使用,而且可以抗击许多对口令的伪造攻击。
But it still has some security hidden troubles, for instance: replay attack, password guessing, inter-session chosen plaintext attacks.
但仍存在一些隐患,例如:重放攻击、密码猜测、会话中选择明文攻击等等。
In this paper, we focus on the vulnerability that the administrator account and password are empty, using some basic methods of attack, describing in detail the process of attacks.
利用漏洞对系统进行攻击成为了黑客们惯用本文针对对管理员账号口令为空这一安全漏洞,采用了一些基本的攻击方法,详细地描述了具体地攻击过程。
Hashed passwords stored in a text file cannot be used to regenerate the original password, but they are potentially vulnerable to a dictionary attack.
储存在文字档中的杂凑密码无法用于重新产生原始密码,但它们可能容易受到字典攻击。
He said: "the biggest mistake anyone can make is using the same password for each account as you can become more vulnerable should a cyber attack occur."
他说:“最大的错误是你的所有账户都使用同一个密码,黑客攻击时,你的账户会变得非常脆弱。”
The main way: password loophole attack, SQL Server extended stored procedure attack, SQL Injection (SQL Injection), steals backup, etc.
主要手法有:口令漏洞攻击、SQLServer扩展存储过程攻击、SQL注入(SQLInjection)、窃取备份等。
One option a thief might try to crack your password is a brute-force dictionary attack .
一个选项一个小偷可能企图攻破密码是强力字典攻击。
The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.
基于验证元的口令认证密钥交换协议的最基本安全目标是抵抗字典攻击和服务器泄露攻击。
This attack is made much more difficult by the introduction of random bytes at the end of the password before the key derivation.
这项攻击由于金钥衍生前在密码末端导入随机位元组而更显困难。
Google Chrome defends against this subtle attack by checking the page to which the password data is submitted, once again using the same-origin policy.
GoogleChrome阻拦了这种狡猾的攻击,再一次使用same - origin策略,检查密码数据被提交到哪个页面。
Attack, a method of resisting server compromise attack is given and a new password-based authenticated key agreement protocol is proposed.
针对服务器泄漏攻击,给出了抵抗这种攻击的方法,提出了一个新的基于口令的认证密钥协商协议。
Attack, a method of resisting server compromise attack is given and a new password-based authenticated key agreement protocol is proposed.
针对服务器泄漏攻击,给出了抵抗这种攻击的方法,提出了一个新的基于口令的认证密钥协商协议。
应用推荐