SlideShare una empresa de Scribd logo
1 de 8
Brute Force Attack
WHAT IS IT AND HOW TO PREVENT IT!
What is a Brute Force Attack?
• A Brute Force
Attack is the simplest
method to gain access
to a site or server (or
anything that is
password protected).
• It tries various
combinations of
usernames and
passwords until it gets
in. This repetitive
action is like an army
attacking a fort.
How it is done?
• Every common ID (for e.g. “admin”) has a password. All you
need to do is try to guess the password. Simple, isn’t it?
• Well, not really!
• Let’s say if it’s a 4-digit-pin, you have 10 numeric digits from
0 to 9. This means there are 100 possibilities.
• You can figure this out with pen and paper like Mr. Bean did
in the movie, Mr. Bean’s Holiday.
• But, the truth is that no password in the world consists of only
4 characters.
How it is done?
• Let’s say if we have an alphanumeric 8-character password.
– We can have 52 possible alphabetic (normal + UPPER & Lower)
combinations
– Now add the Numeric digits, i.e. 10.
– So, we have 62 characters in total.
• For 8-character-password, it will be 628 which will make 2.1834011×1014
possible combinations.
• If we attempt 218 trillion combinations at 1 try per second, it would take 218
trillion seconds or 3.6 trillion minutes, or at most, around 7 million years to
crack the password.
Then, How Can It Happen?
• If you are interested in cracking passwords, you will have to use
computers and write a few basic codes.
• But a normal computer won’t do. You would need a
supercomputer.
– After almost 1x109 attempts per second, after 22 seconds, You should be
able to break an 8 character password.
• Computing resources of this kind are not available to common
people. But hackers are not common people.
That’s Scary! What to do Now?
• It is essential to have additional layers of security in order
to detect and deflect any password breaching attempt.
• There are many tools available for securing different
applications which deny a user after a predefined number
of attempts.
• For example, for SSH we can use Fail2ban or Deny hosts.
How To Prevent It?
• Take these precautionary measures to
prevent attacks:
–Create a longer password.
–Use UPPERCASE and lowercase
alphabets, numbers, and special
characters.
–Use different passwords for different
accounts.
Am I Safe on Cloudways?
Yes!
• Our security system is capable of identifying brute force
attacks and banning IP’s being used in such attacks.
• We are always at work to protect our Cloudways Platform
and the servers hosted on it.
SIGN UP NOW AND SEE FOR YOURSELF!

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Brute Forcing
Brute ForcingBrute Forcing
Brute Forcing
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Security testing
Security testingSecurity testing
Security testing
 
Password Attack
Password Attack Password Attack
Password Attack
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITY
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Computer security
Computer securityComputer security
Computer security
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 

Destacado

Destacado (12)

Network security
Network securityNetwork security
Network security
 
Types of authentication
Types of authenticationTypes of authentication
Types of authentication
 
Unit08
Unit08Unit08
Unit08
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Bruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxBruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linx
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Storytelling Is The New SEO
Storytelling Is The New SEOStorytelling Is The New SEO
Storytelling Is The New SEO
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
 
Kerberos
KerberosKerberos
Kerberos
 

Similar a Brute force attack

Password Management
Password ManagementPassword Management
Password ManagementDavon Smart
 
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Dan Kaminsky
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Justin Bull
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxssuser04fcec
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Mike Barker
 
Password protection
Password protectionPassword protection
Password protectionpost_it
 
Presentation1
Presentation1Presentation1
Presentation1asimo424
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON
 
Passwords, Passwords and more Passwords
Passwords, Passwords and more PasswordsPasswords, Passwords and more Passwords
Passwords, Passwords and more Passwordsclcewing
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Homezaimorkai
 

Similar a Brute force attack (20)

Password Management
Password ManagementPassword Management
Password Management
 
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
 
Tek tak machine learning
Tek tak machine learningTek tak machine learning
Tek tak machine learning
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.
 
Password protection
Password protectionPassword protection
Password protection
 
Presentation1
Presentation1Presentation1
Presentation1
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?
 
Passwords, Passwords and more Passwords
Passwords, Passwords and more PasswordsPasswords, Passwords and more Passwords
Passwords, Passwords and more Passwords
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
10 things to teach end users
10 things to teach end users10 things to teach end users
10 things to teach end users
 
Hack your way into
Hack your way intoHack your way into
Hack your way into
 
Password hacking
Password hackingPassword hacking
Password hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 

Más de Jamil Ali Ahmed

15 Ways To Speed Up WordPress Websites in 2017 [Infographic]
15 Ways To Speed Up WordPress Websites in 2017 [Infographic]15 Ways To Speed Up WordPress Websites in 2017 [Infographic]
15 Ways To Speed Up WordPress Websites in 2017 [Infographic]Jamil Ali Ahmed
 
20 Top WordPress Influencers From UK
20 Top WordPress Influencers From UK20 Top WordPress Influencers From UK
20 Top WordPress Influencers From UKJamil Ali Ahmed
 
5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer SatisfactionJamil Ali Ahmed
 
5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer SatisfactionJamil Ali Ahmed
 
Seo seminar presentaion jamil ali ahmed
Seo seminar presentaion   jamil ali ahmedSeo seminar presentaion   jamil ali ahmed
Seo seminar presentaion jamil ali ahmedJamil Ali Ahmed
 

Más de Jamil Ali Ahmed (6)

15 Ways To Speed Up WordPress Websites in 2017 [Infographic]
15 Ways To Speed Up WordPress Websites in 2017 [Infographic]15 Ways To Speed Up WordPress Websites in 2017 [Infographic]
15 Ways To Speed Up WordPress Websites in 2017 [Infographic]
 
20 Top WordPress Influencers From UK
20 Top WordPress Influencers From UK20 Top WordPress Influencers From UK
20 Top WordPress Influencers From UK
 
5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction
 
5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction5 Ingredients for Achieving Total Customer Satisfaction
5 Ingredients for Achieving Total Customer Satisfaction
 
Become a SEO Expert
Become a SEO ExpertBecome a SEO Expert
Become a SEO Expert
 
Seo seminar presentaion jamil ali ahmed
Seo seminar presentaion   jamil ali ahmedSeo seminar presentaion   jamil ali ahmed
Seo seminar presentaion jamil ali ahmed
 

Último

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Último (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Brute force attack

  • 1. Brute Force Attack WHAT IS IT AND HOW TO PREVENT IT!
  • 2. What is a Brute Force Attack? • A Brute Force Attack is the simplest method to gain access to a site or server (or anything that is password protected). • It tries various combinations of usernames and passwords until it gets in. This repetitive action is like an army attacking a fort.
  • 3. How it is done? • Every common ID (for e.g. “admin”) has a password. All you need to do is try to guess the password. Simple, isn’t it? • Well, not really! • Let’s say if it’s a 4-digit-pin, you have 10 numeric digits from 0 to 9. This means there are 100 possibilities. • You can figure this out with pen and paper like Mr. Bean did in the movie, Mr. Bean’s Holiday. • But, the truth is that no password in the world consists of only 4 characters.
  • 4. How it is done? • Let’s say if we have an alphanumeric 8-character password. – We can have 52 possible alphabetic (normal + UPPER & Lower) combinations – Now add the Numeric digits, i.e. 10. – So, we have 62 characters in total. • For 8-character-password, it will be 628 which will make 2.1834011×1014 possible combinations. • If we attempt 218 trillion combinations at 1 try per second, it would take 218 trillion seconds or 3.6 trillion minutes, or at most, around 7 million years to crack the password.
  • 5. Then, How Can It Happen? • If you are interested in cracking passwords, you will have to use computers and write a few basic codes. • But a normal computer won’t do. You would need a supercomputer. – After almost 1x109 attempts per second, after 22 seconds, You should be able to break an 8 character password. • Computing resources of this kind are not available to common people. But hackers are not common people.
  • 6. That’s Scary! What to do Now? • It is essential to have additional layers of security in order to detect and deflect any password breaching attempt. • There are many tools available for securing different applications which deny a user after a predefined number of attempts. • For example, for SSH we can use Fail2ban or Deny hosts.
  • 7. How To Prevent It? • Take these precautionary measures to prevent attacks: –Create a longer password. –Use UPPERCASE and lowercase alphabets, numbers, and special characters. –Use different passwords for different accounts.
  • 8. Am I Safe on Cloudways? Yes! • Our security system is capable of identifying brute force attacks and banning IP’s being used in such attacks. • We are always at work to protect our Cloudways Platform and the servers hosted on it. SIGN UP NOW AND SEE FOR YOURSELF!