SlideShare a Scribd company logo
Brute Force Attack
WHAT IS IT AND HOW TO PREVENT IT!
What is a Brute Force Attack?
• A Brute Force
Attack is the simplest
method to gain access
to a site or server (or
anything that is
password protected).
• It tries various
combinations of
usernames and
passwords until it gets
in. This repetitive
action is like an army
attacking a fort.
How it is done?
• Every common ID (for e.g. “admin”) has a password. All you
need to do is try to guess the password. Simple, isn’t it?
• Well, not really!
• Let’s say if it’s a 4-digit-pin, you have 10 numeric digits from
0 to 9. This means there are 100 possibilities.
• You can figure this out with pen and paper like Mr. Bean did
in the movie, Mr. Bean’s Holiday.
• But, the truth is that no password in the world consists of only
4 characters.
How it is done?
• Let’s say if we have an alphanumeric 8-character password.
– We can have 52 possible alphabetic (normal + UPPER & Lower)
combinations
– Now add the Numeric digits, i.e. 10.
– So, we have 62 characters in total.
• For 8-character-password, it will be 628 which will make 2.1834011×1014
possible combinations.
• If we attempt 218 trillion combinations at 1 try per second, it would take 218
trillion seconds or 3.6 trillion minutes, or at most, around 7 million years to
crack the password.
Then, How Can It Happen?
• If you are interested in cracking passwords, you will have to use
computers and write a few basic codes.
• But a normal computer won’t do. You would need a
supercomputer.
– After almost 1x109 attempts per second, after 22 seconds, You should be
able to break an 8 character password.
• Computing resources of this kind are not available to common
people. But hackers are not common people.
That’s Scary! What to do Now?
• It is essential to have additional layers of security in order
to detect and deflect any password breaching attempt.
• There are many tools available for securing different
applications which deny a user after a predefined number
of attempts.
• For example, for SSH we can use Fail2ban or Deny hosts.
How To Prevent It?
• Take these precautionary measures to
prevent attacks:
–Create a longer password.
–Use UPPERCASE and lowercase
alphabets, numbers, and special
characters.
–Use different passwords for different
accounts.
Am I Safe on Cloudways?
Yes!
• Our security system is capable of identifying brute force
attacks and banning IP’s being used in such attacks.
• We are always at work to protect our Cloudways Platform
and the servers hosted on it.
SIGN UP NOW AND SEE FOR YOURSELF!

More Related Content

What's hot

Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hacking
begmohsin
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Hajer alriyami
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
Enrico Zimuel
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
dmc5abdulla
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
Divyank Jindal
 
System hacking
System hackingSystem hacking
System hacking
CAS
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
Anoop T
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Sagar Verma
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Sql injections - with example
Sql injections - with exampleSql injections - with example
Sql injections - with example
Prateek Chauhan
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
Hansa Nidushan
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar
 
SQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint PresentationSQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint Presentation
Rapid Purple
 
Phishing
PhishingPhishing
seminar report on Sql injection
seminar report on Sql injectionseminar report on Sql injection
seminar report on Sql injection
Jawhar Ali
 
Sql injection attack
Sql injection attackSql injection attack
Sql injection attack
RajKumar Rampelli
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Nitheesh Adithyan
 

What's hot (20)

Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hacking
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
System hacking
System hackingSystem hacking
System hacking
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Sql injections - with example
Sql injections - with exampleSql injections - with example
Sql injections - with example
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
SQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint PresentationSQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint Presentation
 
Phishing
PhishingPhishing
Phishing
 
seminar report on Sql injection
seminar report on Sql injectionseminar report on Sql injection
seminar report on Sql injection
 
Sql injection attack
Sql injection attackSql injection attack
Sql injection attack
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Viewers also liked

Network security
Network securityNetwork security
Types of authentication
Types of authenticationTypes of authentication
Types of authentication
Alexis Goguen
 
Unit08
Unit08Unit08
Ch02...1
Ch02...1Ch02...1
Ch02...1
nathanurag
 
Bruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxBruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linx
idsecconf
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
Shafaan Khaliq Bhatti
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Storytelling Is The New SEO
Storytelling Is The New SEOStorytelling Is The New SEO
Storytelling Is The New SEO
Martin (Marty) Smith
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong
 
Password Attack
Password Attack Password Attack
Password Attack
Sina Manavi
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
Ajit Dadresa
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
Stormpath
 
Kerberos
KerberosKerberos
Kerberos
Sudeep Shouche
 

Viewers also liked (13)

Network security
Network securityNetwork security
Network security
 
Types of authentication
Types of authenticationTypes of authentication
Types of authentication
 
Unit08
Unit08Unit08
Unit08
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Bruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxBruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linx
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Storytelling Is The New SEO
Storytelling Is The New SEOStorytelling Is The New SEO
Storytelling Is The New SEO
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Password Attack
Password Attack Password Attack
Password Attack
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
 
Kerberos
KerberosKerberos
Kerberos
 

Similar to Brute force attack

Password Management
Password ManagementPassword Management
Password Management
Davon Smart
 
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Dan Kaminsky
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
Justin Bull
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
Yury Chemerkin
 
Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
Mohammed Almeshekah
 
Tek tak machine learning
Tek tak machine learningTek tak machine learning
Tek tak machine learning
Vivek Srinivasan
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
ssuser04fcec
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.
Mike Barker
 
Password protection
Password protectionPassword protection
Password protection
post_it
 
Presentation1
Presentation1Presentation1
Presentation1
asimo424
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON
 
Passwords, Passwords and more Passwords
Passwords, Passwords and more PasswordsPasswords, Passwords and more Passwords
Passwords, Passwords and more Passwords
clcewing
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
10 things to teach end users
10 things to teach end users10 things to teach end users
10 things to teach end users
Progressive Integrations
 
Hack your way into
Hack your way intoHack your way into
Hack your way into
AkshayPandurangi
 
Password hacking
Password hackingPassword hacking
Password hacking
Mr. FM
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
zaimorkai
 

Similar to Brute force attack (20)

Password Management
Password ManagementPassword Management
Password Management
 
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
 
Tek tak machine learning
Tek tak machine learningTek tak machine learning
Tek tak machine learning
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.
 
Password protection
Password protectionPassword protection
Password protection
 
Presentation1
Presentation1Presentation1
Presentation1
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?
 
Passwords, Passwords and more Passwords
Passwords, Passwords and more PasswordsPasswords, Passwords and more Passwords
Passwords, Passwords and more Passwords
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
10 things to teach end users
10 things to teach end users10 things to teach end users
10 things to teach end users
 
Hack your way into
Hack your way intoHack your way into
Hack your way into
 
Password hacking
Password hackingPassword hacking
Password hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 

More from Jamil Ali Ahmed

15 Ways To Speed Up WordPress Websites in 2017 [Infographic]
15 Ways To Speed Up WordPress Websites in 2017 [Infographic]15 Ways To Speed Up WordPress Websites in 2017 [Infographic]
15 Ways To Speed Up WordPress Websites in 2017 [Infographic]
Jamil Ali Ahmed
 
20 Top WordPress Influencers From UK
20 Top WordPress Influencers From UK20 Top WordPress Influencers From UK
20 Top WordPress Influencers From UK
Jamil Ali Ahmed
 
5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction
Jamil Ali Ahmed
 
5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction
Jamil Ali Ahmed
 
Become a SEO Expert
Become a SEO ExpertBecome a SEO Expert
Become a SEO Expert
Jamil Ali Ahmed
 
Seo seminar presentaion jamil ali ahmed
Seo seminar presentaion   jamil ali ahmedSeo seminar presentaion   jamil ali ahmed
Seo seminar presentaion jamil ali ahmed
Jamil Ali Ahmed
 

More from Jamil Ali Ahmed (6)

15 Ways To Speed Up WordPress Websites in 2017 [Infographic]
15 Ways To Speed Up WordPress Websites in 2017 [Infographic]15 Ways To Speed Up WordPress Websites in 2017 [Infographic]
15 Ways To Speed Up WordPress Websites in 2017 [Infographic]
 
20 Top WordPress Influencers From UK
20 Top WordPress Influencers From UK20 Top WordPress Influencers From UK
20 Top WordPress Influencers From UK
 
5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction
 
5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction
 
Become a SEO Expert
Become a SEO ExpertBecome a SEO Expert
Become a SEO Expert
 
Seo seminar presentaion jamil ali ahmed
Seo seminar presentaion   jamil ali ahmedSeo seminar presentaion   jamil ali ahmed
Seo seminar presentaion jamil ali ahmed
 

Recently uploaded

Sonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdfSonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdf
SubhamMandal40
 
WhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring AppsWhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring Apps
HackersList
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
Edge AI and Vision Alliance
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
Matthias Neugebauer
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Zilliz
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Muhammad Ali
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
maigasapphire
 
The importance of Quality Assurance for ICT Standardization
The importance of Quality Assurance for ICT StandardizationThe importance of Quality Assurance for ICT Standardization
The importance of Quality Assurance for ICT Standardization
Axel Rennoch
 
Uncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in LibrariesUncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in Libraries
Brian Pichman
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
shyamraj55
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
alexjohnson7307
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Kunal Gupta
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
SynapseIndia
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Torry Harris
 
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptxIntroduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
313mohammedarshad
 
The Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF GuideThe Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF Guide
Shiv Technolabs
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 

Recently uploaded (20)

Sonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdfSonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdf
 
WhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring AppsWhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring Apps
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
 
The importance of Quality Assurance for ICT Standardization
The importance of Quality Assurance for ICT StandardizationThe importance of Quality Assurance for ICT Standardization
The importance of Quality Assurance for ICT Standardization
 
Uncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in LibrariesUncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in Libraries
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
 
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptxIntroduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
 
The Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF GuideThe Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF Guide
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 

Brute force attack

  • 1. Brute Force Attack WHAT IS IT AND HOW TO PREVENT IT!
  • 2. What is a Brute Force Attack? • A Brute Force Attack is the simplest method to gain access to a site or server (or anything that is password protected). • It tries various combinations of usernames and passwords until it gets in. This repetitive action is like an army attacking a fort.
  • 3. How it is done? • Every common ID (for e.g. “admin”) has a password. All you need to do is try to guess the password. Simple, isn’t it? • Well, not really! • Let’s say if it’s a 4-digit-pin, you have 10 numeric digits from 0 to 9. This means there are 100 possibilities. • You can figure this out with pen and paper like Mr. Bean did in the movie, Mr. Bean’s Holiday. • But, the truth is that no password in the world consists of only 4 characters.
  • 4. How it is done? • Let’s say if we have an alphanumeric 8-character password. – We can have 52 possible alphabetic (normal + UPPER & Lower) combinations – Now add the Numeric digits, i.e. 10. – So, we have 62 characters in total. • For 8-character-password, it will be 628 which will make 2.1834011×1014 possible combinations. • If we attempt 218 trillion combinations at 1 try per second, it would take 218 trillion seconds or 3.6 trillion minutes, or at most, around 7 million years to crack the password.
  • 5. Then, How Can It Happen? • If you are interested in cracking passwords, you will have to use computers and write a few basic codes. • But a normal computer won’t do. You would need a supercomputer. – After almost 1x109 attempts per second, after 22 seconds, You should be able to break an 8 character password. • Computing resources of this kind are not available to common people. But hackers are not common people.
  • 6. That’s Scary! What to do Now? • It is essential to have additional layers of security in order to detect and deflect any password breaching attempt. • There are many tools available for securing different applications which deny a user after a predefined number of attempts. • For example, for SSH we can use Fail2ban or Deny hosts.
  • 7. How To Prevent It? • Take these precautionary measures to prevent attacks: –Create a longer password. –Use UPPERCASE and lowercase alphabets, numbers, and special characters. –Use different passwords for different accounts.
  • 8. Am I Safe on Cloudways? Yes! • Our security system is capable of identifying brute force attacks and banning IP’s being used in such attacks. • We are always at work to protect our Cloudways Platform and the servers hosted on it. SIGN UP NOW AND SEE FOR YOURSELF!