Is a dictionary attack a brute force attack?

The user wrote: «I crack ZIP the password in your Passcovery Suite program. Excellent speed of search at attack of a brute force! But it strongly gives at attack according to the dictionary. In what the reason?»

The reason in speed of breaking of ZIP archives with classical encryption.

A dictionary attack will be slower than a brute force attack for formats at high speed of recovery of passwords. The matter is that reading and preparation of passwords from the file of the dictionary demands much more time, than validation of passwords.

That is, at attack of a brute force, passwords to Zip to archives with classical enciphering can get over with a speed in some billion passwords a second (on the good videocard). And at the same time attack according to the dictionary will show only million passwords a second. And when using governed speed drops even lower…

For formats at low speed of restoration (and now it honor all formats) a difference in speed between attack according to the dictionary and attack of a brute force it will not be appreciable as validation of passwords takes more time, than reading/preparation of passwords from the dictionary file.

Formats where attack according to the dictionary will be more slowly, than attack of a brute force:

  • Zip-archives with classical encryption
  • Microsoft Office 97-2003 documents

Formats where speed of attack according to the dictionary will be same as at attack of a brute force:

  • Zip archives with WinZip AES enciphering
  • RAR3/RAR5 archives
  • OpenOffice, Microsoft Office 2007-2016, Adobe PDF documents
  • TrueCrypt volumes
  • Apple iOS/BlackBerry OS backups
  • WPA/WPA2 handshakes

About types of password attacks

Dictionary attack. Passwords are read out from the dictionary file - the usual text file where it is row-wise words passwords are written down. The program for recovery of passwords consistently reads out these words passwords and checks them.

Brute force attack (direct search). Passwords are generated by the program for password recovery from the set of symbols specified by the user and checked right then. Optionally attack of a brute force can use a password mask - a template for creation of passwords.

Passcovery Suite for password recovery

Passcovery Suite restores passwords for files of popular formats. Provides acceleration of search of passwords on the videocards AMD/NVIDIA. Offers enhanced features for carrying out attack according to the dictionary and attacks of a brute force: work scenarios, mutation of the dictionaries, expanded mask. The program restores/deletes a number of passwords instantly.

The demo version for Windows x86/x64 is available on the Passcovery website:

Is a dictionary attack a brute force attack?
Passcovery Suite
for Microsoft Office, OpenOffice/LibreOffice, Adobe PDF, Zip, RAR, TrueCrypt, Apple iOS, BlackBerry OS, WPA
20.12 Download x86
(16212 Kb)
Download x64
(18784 Kb)
Is a dictionary attack a brute force attack?
Passcovery Suite for fastest GPU password recovery

For recovery of passwords to Zip archives, Passcovery also offers a separate product:

Is a dictionary attack a brute force attack?
Accent ZIP Password Recovery
for Zip archives with classical and WinZip AES encryption
20.09 Download x86
(7540 Kb)
Download x64
(9068 Kb)
Is a dictionary attack a brute force attack?
AccentZPR for Zip/Zipx password recovery

https://d1rytvr7gmk1sx.cloudfront.net/wp-content/uploads/2018/12/bruteforce-cs.MP4

Hackers always have a goal–sometimes reaching that goal is as simple as a phishing attack or exploiting a software vulnerability, but that isn’t always the case. When a hacker’s objective lies beyond their reach thanks to good cybersecurity practices such as password rules and encryption, they might turn to another method: Brute force.

If you hit a locked box enough times, it will pop open, and the same (theoretically) goes for breaking into a computer system. By trying every possible password combination, or using a dictionary of common passwords, a hacker can gain access to an organization’s most valuable secrets.

It isn’t just web applications that are at risk from brute force attacks–encrypted databases, password-protected documents, and other secure data can be stolen in a brute force attack, whether it’s available online or downloaded to an attacker’s computer.

It’s essential that cybersecurity professionals know the risks associated with brute force attacks. Read on to find out what you need to know about this classic form of cybersecurity attack, how safe you may (or may not) be, and how to defend your systems against brute force attacks.

This article is also available as a download, Brute force and dictionary attacks: A cheat sheet (free PDF).

SEE: Encryption policy (TechRepublic Premium)

What is a brute force attack?

Brute force attacks involves repeated login attempts using every possible letter, number, and character combination to guess a password.

An attacker using brute force is typically trying to guess one of three things: A user or an administrator password, a password hash key, or an encryption key. Guessing a short password can be relatively simple, but that isn’t necessarily the case for longer password or encryption keys–the difficulty of brute force attacks grows exponentially the longer the password or key is.

The most basic form of brute force attack is an exhaustive key search, which is exactly what it sounds like: Trying every single possible password solution (i.e., lowercase letters, capital letters, numbers, and special characters) character by character until a solution is found.

Other brute force methods attempt to narrow the field of possible passwords by using a dictionary of terms (which is covered in more detail below), a rainbow table of precomputed password hashes, or rules based on usernames or other characteristics known about the account being targeted.

SEE: Password management policy (TechRepublic Premium)

Whichever method an attacker chooses, the processing power needed to perform a brute force attack can be intense, especially when faced with modern encryption techniques. To solve that problem attackers have turned to specialized hardware that looks a lot like a cryptocurrency mining rig.

Brute-force attacks and cryptocurrency mining are essentially the same thing: Brute force computing power is used to manually crack encryption. That means the hardware needed to perform either with any degree of efficiency is the same–graphics processing units (GPUs) and application-specific integrated circuits (ASICs) designed for cryptocurrency use.

GPUs and cryptocurrency ASICs are designed to handle large loads of repetitive tasks, which is exactly what a brute force attacker needs. That doesn’t mean every hacker who is attempting a brute force attack uses one, but those who are serious about stealing your data definitely do.

Brute force attacks would be impossible for an individual to try manually, which is why a number of popular programs have appeared over the years that, while having legitimate purposes, can easily be turned to illicit use.

Additional resources

  • New method makes cracking WPA/WPA2 Wi-Fi network passwords easier and faster (TechRepublic)
  • Trump, Google, United Nations are among 2018’s worst password offenders (ZDNet)
  • A botnet of over 20,000 WordPress sites is attacking other WordPress sites (ZDNet)
  • ESET discovers 21 new Linux malware families (ZDNet)
  • Hacking campaign combines attacks to target government, finance, and energy (ZDNet)
  • (ZDNet)

What is a dictionary attack?

Exhaustive key searches are the solution to cracking any kind of cryptography, but they can take a very long time. When an attacker has a high degree of confidence that the password they’re trying to crack consists of certain words, phrases, or number and letter combinations, it can be much quicker to compile a dictionary of possible combinations and use that instead.

SEE: All of TechRepublic’s cheat sheets and smart person’s guides

Dictionary attacks can use an actual dictionary, but it’s more likely for them to contain a shorter list of words that an attacker thinks are likely to be successful. Commonly used password lists, popular names, pet names, movie or television characters, and other words can all be part of a dictionary list.

That’s not to say there isn’t an element of randomness to dictionary attacks–they typically account for common passwords that append a number or special character on the end of a word, or substitute a letter for a number, in order to guess any number of variations on a word or phrase.

Additional resources

  • Here’s what happens during a social engineering cyber-attack (TechRepublic)
  • Brute Force Attacks: Beyond password basics (ZDNet)
  • Watch out for these top 5 cyberattack vectors (TechRepublic)
  • The day computer security turned real: The Morris Worm turns 30 (ZDNet)

Are brute force attacks only an online problem?

When thinking of a brute force or a dictionary attack, one may jump to the conclusion that it’s a problem exclusive to web applications or other secure online locations, but that’s hardly the case. Offline brute force attacks are very real and may even be a bigger problem than those targeting internet assets. It’s important to specify what’s different between online and offline brute force attacks.

SEE: More most-see cybersecurity coverage (TechRepublic Flipboard magazine)

Online brute force attacks are performed in real time with an attacker directly connected to the system they’re attacking. The cybersecurity attacks are restricted by elements such as internet bandwidth, security measures, and possible discovery by the victim.

Offline brute force attacks have no connection to the system being targeted, which is a large part of what makes them so dangerous. If an attacker is able to steal a password hash, encryption key, Security Account Manager (SAM) file (Windows’ method of storing passwords), /etc/shadow/ file (the Linux equivalent of SAM), encrypted database, password protected file, or other secure document, that person has an unlimited amount of time to crack it without detection.

Offline brute force attacks are only limited by the computing power available to the attacker; with the proper setup, secured files, encryption keys, or passwords could be exposed in little time.

Additional resources

  • For just $10, a hacker can attack your business via RDP: Here’s how to stay safe (TechRepublic)
  • How to break Instagram with brute force (ZDNet)
  • How credential stuffing contributed to 8.3B malicious botnet logins in early 2018 (TechRepublic)
  • iOS 9’s new longer passcode will make brute-force attacks far tougher (ZDNet)

Is strong encryption effective against brute force attacks?

Security is often rated based on how long it would take a theoretical attacker to break it using brute force methods. Encryption complexity vs. time to break it grows exponentially because every new character adds 95 possible letters, numbers, and special characters to cycle through to find the right one.

Cracking modern 256-bit encryption requires taking a lot of things into account: The complexity of the key or password, computing power, and even the laws of physics have to be considered when estimating the time it will take to crack a password or encryption key.

It’s easy to find calculations that take all of these variables into account–most of which arrive at the conclusion that it would take more time than the age of the universe to break even 128-bit encryption. Double that to 256 bit, and you have what theoretically is an unbreakable code.

SEE: Quick glossary: Encryption (TechRepublic Premium)

Passwords are easier to break because assumptions can be made about what they contain, thereby limiting the number of tries it takes to brute force crack them. Encrypted passwords stored as hashes are still easy to break, as demonstrated in this blog post by cybersecurity professional Daniel Sewell.

Using Hashcat, Sewell was able to break an unsalted SHA1 hashed password in less than one second, and a PBKDF2-SHA256 salted hash in eight and a half minutes.

So is strong encryption safe against brute force attacks? Yes and no–the weakness is in how passwords are stored. No attacker is going to try to brute force a 256-bit encrypted document–they’re going to try to figure out what password will get them access to the unencrypted version.

Additional resources

  • Why WPA3 matters, and how new Easy Connect feature will onboard IoT devices with a QR code (TechRepublic)
  • These AI-generated fake fingerprints can fool smartphone security (ZDNet)
  • Zazzle resets “thousands” of accounts after hackers brute-force passwords (ZDNet)

How can IT professionals protect against brute force and dictionary attacks?

Brute force attacks generally focus on the weak point of encryption: Passwords. As Sewell showed in his blog post, even a well-hashed password will only slow a skilled attacker down if they’re able to steal a hash table.

SEE: A winning strategy for cybersecurity (ZDNet special report) | Download the report as a PDF (TechRepublic)

In the case of online brute force attacks, the solutions are relatively simple: Put limits in place that prevent multiple login attempts. This can be done in several ways:

  • Lock an account out after a certain number of failed attempts;
  • Force an account that fails to log in multiple times to use a method like captcha or other secondary verification;
  • Use two-factor authentication so that more than a password is required to log in; and.
  • Ban multiple login attempts from a single IP address.

Offline brute force attack prevention is a bit trickier: If an attacker gains access to password hash files, it’s only a matter of time before they’re walking in the front door.

So how can you prevent an offline brute force attack from succeeding? There are several enhancements you can make to your security to protect against one:

  • Longer passwords are better–special characters don’t matter anymore since they can be guessed with ease;
  • Screen passwords to prevent the use of common words, phrases, or combinations thereof;
  • Make sure your hashes are truly secure–if you’re unsure where to start, check out this guide to salted password hashing; and
  • Never store passwords in plain text–if an attacker gets access to that, they don’t even need to bother brute forcing it.

Additional resources

  • Cheat sheet: How to become a cybersecurity pro (TechRepublic)
  • Worried about identity theft? Then you should avoid these password pitfalls (TechRepublic)
  • Office 365 admins: How to mitigate new attack that bypasses 2FA on Windows systems (TechRepublic)
  • 100% of corporate networks ‘highly vulnerable’ to attacks, here’s how to secure yours (TechRepublic)
Is a dictionary attack a brute force attack?

Image: bluebay2014, Getty Images/iStockphoto

What is a dictionary attack and how is it different than a brute force attack?

A dictionary attack will use a list of likely passwords in its attempts to break into system. These attacks are more focused than brute-force attacks. Rather than trying to input every possible permutation, an attacker using a dictionary approach would attempt all the permutations in its predetermined library.

Is dictionary attack faster than brute force?

A dictionary password attack is more calculated in that it makes use of dictionary words or a select list of likely passwords and uses those to try to crack a user's password. Dictionary password attacks are a lot faster than brute force attacks because it employs more of an understanding of user password behavior.

What is a dictionary attack?

A Dictionary Attack is a kind of a brute-force assault on a cryptosystem or authentication system. In a dictionary attack, the perpetrators attempt to break the encryption or gain access by spraying a library of terms or other values.

What is brute force dictionary?

Brute-force Attack and Dictionary Attack. Brute-force and dictionary attacks are both cybersecurity attacks in which the attacker attempts to log into an account by using different passwords to find the correct one. These common attacks often succeed because many users use common variations on a few passwords.