[WEBINAR] Better to Ask Permission? Best Practices for Privacy and Security

Password Breaker

Definition - What does Password Breaker mean?

A password breaker is a cryptographic software application tool that is designed to identify or recover an unknown or forgotten username/password of a secure resource, like a network or computer system. It is used to discern passwords contained in the hacked hashed (encrypted) password list of an infiltrated system.

A password breaker is also known as a password cracker.

Techopedia explains Password Breaker

To break into a system, a password breaker needs its dictionary and stolen hashed password list. Common password creation rules are applied to a dictionary to form possible passwords that are hashed and compared to the stolen hashed list. One or more matches indicate the use of a real password for that system.

Due to time restraints, password breakers do not make repeated system login attempts. Additionally, automation prevention measures are included in modern security systems. Some systems permit only a few incorrect attempts before blocking an account.

Password breakers use two common methods for cracking passwords: brute-force attacks and dictionary attacks. A dictionary attack is straightforward because until one or more matches are found, it simply compares the hashed items to the contents of a dictionary that contains known passwords. On the other hand, a brute-force attack iterates through every available permutation, like trying hello1 then hello2, then 3, then 4 and so on - without a hint of intelligence.

A more sophisticated method involving rules occurs with more complex passwords. In this type of attack, users may apply password creation rules to the dictionary to create more complex passwords, which are then hashed and compared to the stolen list.

Cracking can take anywhere from a few minutes to days, weeks or years, depending on password complexity. However, the process is expedited by using graphics processing units (GPU), which are supported by modern password breakers, like John the Ripper and Hashcat.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.