Learning Library

← Back to Library

Top 5 Password Attack Methods

Key Points

  • Stolen or compromised credentials are the leading cause of data breaches, according to major industry reports.
  • Attackers employ five primary tactics—password guessing, harvesting, cracking, spraying, and stuffing—to obtain those credentials.
  • Guessing attacks rely on educated guesses (e.g., personal information or leaked password databases) and are limited by lockout policies that typically allow only three attempts.
  • Harvesting attacks capture passwords directly, often via malware such as keyloggers or information stealers, emphasizing the need for clean, secure systems.

Full Transcript

# Top 5 Password Attack Methods **Source:** [https://www.youtube.com/watch?v=vKPGZHoHX8k](https://www.youtube.com/watch?v=vKPGZHoHX8k) **Duration:** 00:12:54 ## Summary - Stolen or compromised credentials are the leading cause of data breaches, according to major industry reports. - Attackers employ five primary tactics—password guessing, harvesting, cracking, spraying, and stuffing—to obtain those credentials. - Guessing attacks rely on educated guesses (e.g., personal information or leaked password databases) and are limited by lockout policies that typically allow only three attempts. - Harvesting attacks capture passwords directly, often via malware such as keyloggers or information stealers, emphasizing the need for clean, secure systems. ## Sections - [00:00:00](https://www.youtube.com/watch?v=vKPGZHoHX8k&t=0s) **Untitled Section** - - [00:03:13](https://www.youtube.com/watch?v=vKPGZHoHX8k&t=193s) **Password Hash Cracking Process** - The speaker explains how attackers extract hashed password databases, then employ dictionary, common‑password lists, or brute‑force guessing to hash candidate passwords and compare them, ultimately revealing the original passwords. - [00:06:22](https://www.youtube.com/watch?v=vKPGZHoHX8k&t=382s) **Password Spraying and Credential Stuffing Explained** - The speaker outlines how attackers reuse leaked passwords across many accounts or systems in low‑volume attempts to avoid lockout thresholds, employing a single guess per account to stay beneath detection. - [00:09:28](https://www.youtube.com/watch?v=vKPGZHoHX8k&t=568s) **Secure Authentication and Rate Limiting** - The speaker outlines enterprise and personal strategies for protecting credentials—including password managers, multi‑factor authentication, migration to cryptographic passkeys, and rate‑limiting login attempts—to minimize theft and detect abuse. - [00:12:36](https://www.youtube.com/watch?v=vKPGZHoHX8k&t=756s) **Mitigating Attacker Knowledge Exploitation** - The speaker wraps up by highlighting various defensive tactics that prevent attackers from leveraging previously gathered information, urging listeners to implement them to make infiltration much harder. ## Full Transcript
0:00Have you ever wondered how a bad guy hacks your password? 0:03It's a big problem. 0:04In fact, according to both IBM's Cost of a Data Breach Report and the X-Force Threat Intelligence Index, 0:10stolen, misused, or otherwise compromised credentials are the number one attack type. 0:15There are lots of ways this is done, but in this video, I'm gonna focus on five different approaches they use. 0:21Guessing, harvesting, cracking, spraying, and stuffing, 0:25and don't worry that I'm giving away any secrets because the bad guys already know this stuff. 0:29My purpose is to arm the good guys with this knowledge 0:33and provide some tips at the end on what you can do to prevent this from happening to you. 0:38Let's start first with password guessing. 0:41So here we have a bad guy who's gonna try to hack into this system 0:45and he's gonna posit some particular guess into the system. 0:50Well, what is he gonna base that guess on? 0:52Well, it might just be out of his imagination. 0:55It might be just a knowledge about the individual who this system. 1:00It could be because he walked by where their laptop was and saw a yellow sticky on the system. 1:06We refer to these things as the PC sunflower because people collect 1:09a lot of those around their systems and just reads a password off of that. 1:13So a lot different ways they could base this. 1:15And one other possibility is they use a password database. 1:20That is when systems have been cracked in the past, 1:23sometimes we get to find out what all those passwords were in the password database in the clear. 1:28And those are made available publicly on the Internet, and attackers can use that. 1:34So anything the attacker can do to make a more intelligent guess, 1:37those would be the different items that they would consider. 1:42Well, if it's a guessing attack, they're then going to try to log in. 1:45And if they're wrong, okay, then they try again. 1:48And if there wrong again, in most systems, you get three strikes and you're out. 1:53So, that's the problem and that's reason, by the way. 1:56That those three strikes policies are in place. 1:59So someone can't just keep guessing over and over and again. 2:01So usually he's gonna get three guesses and then the account will be locked out. 2:05So unless this is a really good guess, that's probably not a very effective way to do things. 2:11Now, another approach would be harvesting. 2:13This is where the attacker is going to actually know what the password is and it's not a guess. 2:19In a harvesting attack, and there's numbers of different ways this could occur, 2:22but one is they install some sort of malware on this system. 2:26That malware we call a keylogger. 2:29And everything that's typed on this system then is sent to this guy. 2:34It's either stored locally and then later he retrieves it or it's sent in real time. 2:38But that keyloger or an information stealer, info stealer or whatever you want to call it 2:43is something that's recording everything they type including passwords. 2:47So that could be fed directly into this guy and he knows exactly what to enter. 2:52So obviously we need to keep this system clean. 2:55So that it doesn't have that kind of a malware on it. 2:58Another thing that could happen is through a phishing attack where this user is convinced 3:02to log in to some particular website 3:05and then the website is a fake, they think it's a real one and they type in their credentials there and then those flow here. 3:13In either of these cases, the bad guy has just harvested the information and can now log in directly. 3:21Okay, now let's take a look at another technique We call it cracking. 3:25In password cracking, what the attacker is going to do is start with a database of stored passwords. 3:33Maybe he logs into the system, hacks into a system, 3:36and pulls out that database where all the passwords are stored, and he extracts those. 3:41But here's the thing. 3:43Assuming they did a decent job of security, these passwords are hashed. 3:48That is, using a special one-way encryption technique that cannot be reversed. 3:53So they're not readable. 3:54In any normal sense, and there are going to be a number of these hashed passwords 3:59that now the attacker has available to them, but in and of themselves in the hashed form they're no use. 4:07So what can he do in order to reverse what is an irreversible encryption? 4:11Well, you can't, but you can back your way into discovering what the original password was. 4:16And the way that gets done is you start with, again, a different type of guess. 4:22What you would do maybe is take one of these databases of 4:26publicly known available common passwords, or you could use a password dictionary. 4:32Those are also available on the internet. 4:34So you can find a lot of different ways, use it in worst case, 4:38you start doing a brute force where you try every single possible password combination, 4:43but you use some source to pull out a clear text password that you can read 4:48and you hash it in the same way these passwords are hashed. 4:53Then you just do a comparison and say is this equal? 4:57Well if it's not then I move on. 5:00Is it equal? 5:01Is it equal? 5:02And then if it is, then I didn't have to know what the original password was. 5:07I didn' have to break the encryption. 5:09What I did was I figured out what my guess was and I knew that it matched so therefore I know I have found the right password. 5:17That's a way of cracking a password. 5:19Our fourth type of technique... 5:21Is called password spraying. 5:23And in password spraying, again, we need to start off with an attempt, a guess. 5:28Now again, we could get this, maybe from this publicly available information, it could be a lot of other sources, 5:34but we're gonna start off with a guess and what we're going to do is across a particular system, there will be multiple accounts. 5:42So we have account one, account two, and so forth. 5:46So all the way down to account N. 5:49So lots of accounts on this system. 5:51And what we're gonna do is we're going to take that password that we have as a guess, 5:55and we're to try it here and see if it works. 5:59And if it does, of course we're in. 6:01If it doesn't, try it down here. 6:03Then try it done here. 6:05Try it for all of these. 6:06That's why it's called spraying, because we're spraying it across all of the different accounts within a particular system. 6:12And the attacker, think about from their perspective, they don't necessarily need to get into account two or account one. 6:20Their goal is just to get into anything. 6:22So they'll take any password and try it across all of these and until they finally get a hit. 6:28And why does this work? 6:30Well, because people tend to use the same passwords again and again. 6:34So something that is in this publicly available database that was based on a previous breach, 6:40probably someone, if it's a common password, someone has used that password on this system as well. 6:45So it's good place to start with guessing. 6:47And, in that guessing, again ... 6:49The advantage to spring is it avoids the three strikes penalty. 6:54We're only doing one attempt. 6:56If it doesn't work, we move on to the next account. 6:58Then we move onto the next count and the next to count and so forth. 7:02So that way, if unless someone is really looking hard, 7:05they're not gonna even know that they're under attack because it flies slow and low below the radar. 7:12A similar type of attack is credential stuffing, which is the same kind of idea. 7:17It's just a variation on a theme. 7:19In this case, we're gonna take our password guess and we're going to 7:23try it across not multiple accounts, but multiple systems. 7:28So I'll try it a across a particular, if this is system one, and then system two, 7:34system N, I'm gonna try this on this particular system. 7:41And if it works, again, I mean, if it doesn't, I move on, and I move on. 7:47That's what the attacker is going to do in this case. 7:50Now again, very similar to spraying, but notice the difference is, these are across different systems. 7:55This is across a single system. 7:57So same concept. 7:59This one is even harder to detect because probably the person 8:03that is responsible for security on this system may not be the same one that's responsible on this system. 8:07So they may not able to monitor and look across all of these. 8:11So here again, we're leveraging these well-known bad passwords. 8:16And guessing across these systems. 8:18Okay, now we've taken a look at five different types. 8:20There are other ways as well, but at least we've taking a look these. 8:24Now, what can you do to prevent this from happening? 8:27How can you keep from being a victim? 8:29Well, there are three things that we do in cybersecurity. 8:32We do prevention, detection and response. 8:35So let's first take a look at some things you can do for prevention. 8:38So one of the prevention things we can do is test password strength. 8:42So when someone types a password into your system, 8:45you ought to be able to test and see if it's got the right level of complexity to it. 8:50Don't make it too complex because then people just have to go write it down. 8:53But some level of complexity and length, and by the way, length is strength when it comes to passwords. 8:58So longer is probably even better than complexity. 9:02Also check it against a database like we've talked about before, of these known passwords, known vulnerable passwords, 9:08and make sure it doesn't match any of those. 9:11If you can, test and see that someone is using a different password across multiple systems. 9:16So there are a lot of things you can do there. 9:17And to that last point, something you can to encourage people to use multiple passwords and complex long passwords 9:25is to use a password manager or a password vault. 9:28Some sort of secrets management system, if you're looking at this on an enterprise level 9:33or a Password Manager, if you are talking about it on a personal level. 9:37Here, the system can generate strong passwords for you and keep track of all of those for you. 9:42Also make sure it will encourage you that you're less likely to use the same password 9:47across multiple systems, therefore reducing your attack surface. 9:51Another thing is to use multi-factor authentication. 9:54Don't rely just on a password. 9:56Look for other things, not just something you know, something you are, something you have. 10:01So maybe a message to your phone or a biometric like a face ID or something along those lines. 10:08What's the best way to not get your password stolen though? 10:11Don't have one. 10:12Don't have a password. 10:13Get rid of passwords and go with passkeys. 10:15Sounds like the same sort of word, but it's a lot different. 10:19The solution is a lot stronger. 10:21It's based on cryptographic techniques. 10:23I won't get into the details of it, but if you have an option to choose pass keys, do it. 10:29And then the last one I'll mention in terms of prevention is rate limiting. 10:33We want to make sure that someone isn't able to just flood our system with tons and tons of password logins. 10:38You want to baseline. 10:40And understand what is a normal level of traffic for people trying to log in, 10:44and don't accept if all of a sudden you have just a burst of login attempts that don't make any sense. 10:51Okay, then moving to detection, what can we do there? 10:54Well, I'd like to look for a couple of different situations based upon spraying and credential stuffing. 11:00One is multiple failures over time. 11:03I wanna see if I'm seeing an increase in the number of failures over a given interval of time. 11:10Now if an attacker is really smart they'll spread this out over a really long time, 11:13but if they're not then you might just suddenly see a whole bunch of attack attempts 11:18and you would want to flag that and then take some action, which we'll talk about in a second, 11:23also another thing you could be looking for is multiple failures over the account space. 11:29So on a particular system you will be looking four did i have a failure on 11:33one account then another account then another account, another account. 11:36That would be a sure fire sign that we're looking at a password spraying attack, 11:42by the way patent pending on that one. so stay tuned, 11:46Now let's move on the response side. 11:48what could you do on this once you've discovered that you're under attack what should you be doing? 11:54Well one of the things you want to do is block suspicious IPs, 11:58ip addresses, because you know if you're seeing tons of logins from one place all at one time that's probably a bad actor. 12:05So let's just block that IP. Disable compromised accounts is another. 12:11Once we know that an attack has occurred, 12:13we should go back and look and see if maybe that one password 12:17that was attempted across lots of different ones and then suddenly worked on one. 12:20Okay, that was a spraying attack and the one that got logged into is probably suspicious at this point. 12:26So maybe we want to block that until we can do an investigation, 12:30and then ultimately, if we know an account has been compromised, we lock it out, we force a password change. 12:37So that way the attacker can't use the information that they already have to get into the system. 12:42So there you have it, lots of ways for attackers to get in and lots of way for you to keep them from doing it. 12:48Do these things and you'll make life a lot harder for the bad guys and that's how we want it to be