Explore chapters and articles related to this topic
A systematic classification scheme for cyber-attack taxonomy
Published in Stein Haugen, Anne Barros, Coen van Gulijk, Trond Kongsvik, Jan Erik Vinnem, Safety and Reliability – Safe Societies in a Changing World, 2018
S. Kim, J. Shin, G. Heo, J.G. Song
The step after classifying the cyber-attack in terms of cyber-attack scenario is to further subdivide the cyber-attack. The reason for subdivision of cyber-attacks is that even if the basic principles of cyber – attacks are the same, the conditions and vulnerabilities for the cyber-attacks are different, and the attack results and countermeasures are not the same accordingly. Also, if the cyber-attack is further subdivided and complementary measures are taken, it can be a more stable system. As a typical example, password cracking can be subdivided into keylogger attack, dictionary attack, hybrid attack, brute-force attack, and precomputed Hashes attack.
A Review on Application of GANs in Cybersecurity Domain
Published in IETE Technical Review, 2022
Passwords are a high priority for several organizations and industries such as banking, military, share market, social media, and telecommunication. These passwords could be cracked using Brute Force Attack, Dictionary Attack, Rainbow Table Attack, etc. The commonly used password cracking tools includes Brutus, RainbowCrack, Wfuzz, John the Ripper, and THC Hydra.
AI-enabled IoT penetration testing: state-of-the-art and research challenges
Published in Enterprise Information Systems, 2023
Claudia Greco, Giancarlo Fortino, Bruno Crispo, Kim-Kwang Raymond Choo
- John the Ripper is a tool for offline password cracking. Starting from a word list of likely passwords, the tool mutates potential password candidates, for instance replacing alphabet letters with similar symbols. Since short passwords of little complexity are commonly used by users, John the Ripper is frequently successful.