Guest viewing limit reached
  • You have reached the maximum number of guest views allowed
  • Please register below to remove this limitation

No, "hackers" don't run massive brute force attacks anymore

TG1

Staff member
Kids do. Rookies do. Wannabe hackers do and it rarely works and is a waste of time. And don’t try sentence passwords also as that’s a waste and we’re able to develop targeted lists for that too.

I was sent a link someone wrote about using sentences as passwords. A lot of the shit there was basic info but this flat out is wrong. I’ll explain why.

If your being targeted, there’s several things we do. First, we gather every type of email we can find on the person. Then next step is creating a “profile”. Next we run the emails thru places like


Go ahead and check your regular emails now.

What we look for is any database dumps where the targets email has occurred. Then we check those databases, decrypt the hashed password if need be and see what type of passwords you use. Is it one word with capital letters and numbers. Is it sentences. What type of words being used. Then we use a program created to give small lists of possible passwords. Some of these allow to us to input information on the target and go from there.

So if we attempt a brute force (which is rare as fuck cause most often too much hassle and much easier methods) this is what we do. Another program will run it slow and steady. Multiple (local area) IP addresses.

Now the problem with this is that most major services will block or lock up an account that has too many failed passwords.

Dictionary attacks and major brute force attacks stopped working nearly 7 years ago. Database leaks happen all the time. Eventually one will happen for a service you use. Given a sentence password is found then bingo. We now know what type of profile you have for passwords.

Use a password manager like bitwarden or keepass and always use a password generator. If we see these, its usually a lost cause for us to even attempt anything on it and just look to other avenues to access.

Now you want to take it a step further, purchase a bulk of email accounts from 3rd party Russian sites online.


These are cheap and you can get 100 protonmail accounts for $10. Use a different email for each service (changing the password supplied when you use it) and keep it in your bitwarden account under a tab for “disposable” emails. So every website has a clean, single use only password with a generated password from bitwarden.

I have 50 emails for my most important shit and 200 more for misc sites and stuff.

Then each account should have 2 factor authentication turned on as often as possible. It take a few seconds when you need it. It can save your ass.

If a service doesn’t offer 2 fa in today’s world, then they obviously don’t give a shit about security and you should avoid using them at all costs.
 
Last edited:
If your email is on that list do they have access to your account?
One of my emails was on the list. I changed the password to a randomly generated strong password. I have 2FA on the account as well.
Thank you for this information. This is very helpful!
 
Depends. Most is data but hackers use it all the time to create profiles and check. So what would happen is someone would look up that leak. Find out your password on it and then attempt to use it on other sites. Same email and password. That’s why I say use throwaway emails and generated passwords so no one can get anything even if one of those emails got exposed in a breach.
 
I remember you mentioned something about a password database, is this an app that can keep track of all my generated passwords?
 
Bitwarden is a free password manager. Its also able to be a self hosted solution. Because they have a paid features on bitwarden too, self hosting can free those up. Its a lot like 1password or last pass in that its stored on a server.

Keepass is a local password manager. Also good.
 
If your just using the basic bitwarden heres the site.


If you self host bitwarden and want the access to all the paid features heres the link to repo.

 
Back
Top