{"id":30083,"date":"2021-01-18T03:09:35","date_gmt":"2021-01-17T19:09:35","guid":{"rendered":"https:\/\/web.mwwsb.com.my\/pjci\/?post_type=kb&p=30083"},"modified":"2022-09-08T21:36:28","modified_gmt":"2022-09-08T13:36:28","slug":"what-is-a-brute-force-attack","status":"publish","type":"kb","link":"https:\/\/www.casbay.com\/guide\/kb\/what-is-a-brute-force-attack","title":{"rendered":"What is a BRUTE-FORCE ATTACK?"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

What is a BRUTE-FORCE ATTACK?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Brute-Force Attacks occur when an attacker attempts to calculate every possible combination that could make up a password and test against your site<\/strong> to see if it is a correct password. This can be done either by using dictionary words or trying to guess the key<\/strong> created by key derivation functions to encrypt passwords into a secret value.<\/p>

In addition, attackers use a computer program or script, which automatically attempts all possible combinations to gain access. As computer hardware becomes faster and capable of doing more calculations per second, brute force attacks have become more popular as a means to obtain sensitive information stored in databases and other web applications.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t

Recognizing Brute-Force Attacks<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Brute-force attacks are detectable by their volume, rather than the type. You\u2019ll notice a large amount of failed login attempts in your web logs. You may also see the same account logging in over and over with different passwords and from multiple IP addresses.<\/p>

Here is a list of logs to check:<\/p>

Service Logs:<\/strong><\/p>