home |  contact
Insight Home
The Basics
Policies and Procedures
Regulations and Standards
Countermeasures
Attack Techniques
Tools
Exploits
Exploits are the specific attacks used by system crackers to breach your information resources. New exploits are constantly being developed and security professionals are constantly developing coutermeasures.

Brute Force

by Stephen Pellicer

Brute force is a blanket term for using raw power to acquire secret information. It gets its barbaric name from its inelegant approach of simply guessing every possible secret until it guesses the secret it deems a match. It is often employed to guess passwords, defeat one-way hash functions, or even guess the key used to decrypt encrypted data. The effectiveness of brute force depends on three variables: how large the problem space or key space is; how quickly the brute force mechanism can attempt a guess; and the mechanism's ability to verify a correct guess. The primitiveness of brute force attacks is its strength and its weakness. As a weakness, this method must be able to rapidly execute an attempted login, calculate a one-way hash function, or decrypt data using the target encryption algorithm. As a strength, brute force is almost always successful given enough time. Our goal is to make the amount of time for a successful attack uneconomical for the attacker.

More...

»



Home

Services

Partners

About Us

Contact Us

 

©2001-2003 by Itillious, Inc. All Rights Reserved.
Privacy Policy