次の方法で共有


Ways to Compromise Password

Passwords are vulnerable by virtue of the following attacks:

Password Cracking Tools - A variety of software tools, such as L0Phtcrack and NT Crack, automate the guessing of passwords through brute force and with extensive dictionaries of frequently used passwords.

Network Monitoring - This technique, also known as ”sniffing,” allows monitoring (without detection) the contents for any message that streams by and flagging messages based on keywords, such as “login” or “password.”

Brute Force Dialing (or War Dialing) - Programs like ToneLoc automate the process of locating modem telephone lines; then the hacker attempts sign-on with various password alternatives.

Abuse of Administrative Tools. Many tools that have been designed to control and improve networks can be misused for destructive purposes.

Social Engineering. In contrast to the high-tech tools available to uncover passwords, some intruders use non-technical approaches to steal passwords.

Keystroke monitoring - This technique monitor and record user’s keystrokes remotely when user types in password at public kiosks.