Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Password Hacking    

Posted on by

Password Hacking is the process of breaking or cracking and obtaining passwords stored in the target system or when being transmitted between systems. The obtained passwords are used to access accounts on the target system to gain access and privilege access.

Password Cracking, Password Breaking, Password Attack are other terms used for Password Hacking.

The following are the Password Hacking types: 

Non Electronic Attack is where the attacker uses non-technical methods like shoulder surfing, social engineering, dumpster driving to get the passwords from the target.

Active Online Attack is where the attacker connects with the live target system and tries to get the password using techniques like password guessing, brute force attack, dictionary attack, password spraying.

Passive Online Attack is where the attacker tries to get the password offline by sniffing the password when transmitted or using Man in Middle (MITM) attacks.

Offline Attack is where attacker tries to get the password from the password hashes and then crack the hashes to get the actual passwords using password cracking software.

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme