What is a Brute-force Attack?

Polaris
2 min readDec 21, 2020

A brute-force attack uses the trial-and-error method to attempt all possible usernames and passwords to obtain correct combinations. It is usually carried out by scripts or bots that target a platform’s login page, with Content Management Systems like WordPress being favoured targets. Simple and popular, brute force is used by cybercriminals to crack passwords and encryption keys.

Types of Brute-force Attacks

Due to its popularity, there are different methods of brute-force attacks.

  • Simple brute-force attacks: Hackers attempt every possible username-password combination.
  • Dictionary attacks: Using valid usernames, hackers will then run a list of possible passwords against the username.
  • Reverse brute-force attacks: Hackers start with known or common passwords. They then attempt with many usernames, in hopes of guessing correctly.
  • Hybrid brute-force attacks: External logic is integrated into the attack technique. Such attacks typically use both dictionary and simple brute-force attacks.
  • Credential stuffing: This attack uses valid login credentials to attempt to login into other services. The credentials are obtained from data breaches and successful password cracking.

Consequences of Brute-force Attacks

  • Theft of personal data, login credentials and money
  • Infecting websites and machines with malware
  • Collecting credentials to sell to third parties
  • Redirecting users to websites with malicious content

How to Safeguard Against Brute-force Attacks?

  • Limit the number of login attempts with a certain timeframe: This would hinder the hackers’ progress. They may be deterred from continuing the attack.
  • Use longer, more complex passwords: This increases the difficulty and time required to crack the passwords.
  • Implement multi-factor authentication: 2 or more authentication factors are used as part of the login process. This can include using a one-time password (OTP) and fingerprint.
  • Deploy a web application and API protection (WAAP) solution: Such solutions would monitor all incoming web traffic activities and block suspicious IPs and requests.

How Polaris Safeguards Your Website

  • Web Application Firewall: Acting as a shield between malicious attacks and your web assets, Polaris protects against targeted hacks.
  • Leaked data: Polaris provides leaked data detection from a diverse pool of intelligence feeds.
  • Bot Management: Polaris provides automated web traffic scanning, analyses bot behaviour and blocks malicious bots from attacking websites.

--

--

Polaris

Simplifying the Protection of Your Critical Assets from the World’s Greatest Cyber Threats. #AlwaysOnGuard