Reverse Brute-Force Attack

What Does Reverse Brute-Force Attack Mean?

A reverse brute force attack happens when a hacker or black hat party tries to reverse engineer some security or protection process through utilizing a secondary key or piece of data. It’s the reverse of a conventional brute force attack, which generally seeks to “crack” an account through brute force work on a password or similar key.


Techopedia Explains Reverse Brute-Force Attack

To understand the reverse brute force attack, let’s look at what a normal brute force attack consists of.

In a traditional brute force attack, the hacker has an important primary key — an account identifier or some other piece of information. All that he or she needs is the password or encryption key in order to enter systems and wreak havoc.

Traditional brute force attacks, then, focus on decryption and code-breaking software that will simply force discovery through big data analysis or other automated methods. Brute force attacks are contrasted with other kinds of attacks where hackers may use social engineering or phishing schemes to actually get the password in question. A good example of a brute force attack is an algorithm that would identify usable credit card numbers attached to specific names or identifiers.

With that in mind, the reverse brute force attack is where the hacker has that password or key, but needs the original identifier, such as a username or account number.


Related Terms

Margaret Rouse

Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical, business audience. Over the past twenty years her explanations have appeared on TechTarget websites and she's been cited as an authority in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine and Discovery Magazine.Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages. If you have a suggestion for a new definition or how to improve a technical explanation, please email Margaret or contact her…