Tatizo wengi wanapenda kuwa Hackers ila wanafikiri katika kuhack watafanya tu first trial na kufanikiwa kupenetrate apo apo, hiyo ndo shida.. It will take time, it depends on the length of the target's password - jinsi password yake ilivo ndefu na kucombine characters mbalimbali .. ndivyo nawewe utakavyo chukuwa muda mrefu mpaka kuicrack account yake.
So yea, ukiwa hacker jifunze kuwa PATIENT.
Brute force mwaka 2017.Tatizo wengi wanapenda kuwa Hackers ila wanafikiri katika kuhack watafanya tu first trial na kufanikiwa kupenetrate apo apo, hiyo ndo shida.. It will take time, it depends on the length of the target's password - jinsi password yake ilivo ndefu na kucombine characters mbalimbali .. ndivyo nawewe utakavyo chukuwa muda mrefu mpaka kuicrack account yake.
So yea, ukiwa hacker jifunze kuwa PATIENT.
Brute force mwaka 2017.
Umeijaribu au ume copy ukapaste hapa mkuu.
This thing cannot work at all brute force kwa sasa ngumu na hiyo computer mpaka ije kuotea password inabidi iwe na uwezo mkubwa sana na itaichukua siku kadhaa.
Brute forcing kuretrieve password siku hizi ni useless, hii ingekua valuable sana miaka ya 2001 hadi labda 2006 huko ambapo watu bado walikua wanatumia neno love kwenye passwords, siku hizi wanaforce uchanganye capital letters, namba na special character, no way you would brute force that
For sure, it's very tough to crack an AES 128 bit hash! It would take you nearly million years to crack one with even th most expensive GPU powered Computers or Supercomputers.. especially when you encounter a password of this combination a-zA-Z0-9 , pretty tough!Unaweza kusubiria kweli miaka 292 ku brute force 128 bit key ??
Bro, bruteforcing is still possible no matter how much measures will be put. Yes, I do agree with you that bruteforcing it's nearly useless in this era, but the point still stands that it's not that way you say that all social network users use strong password of combination of AlphaNumerals and special characters, i want to assure you that not all users care about any of those silly combinations, some use barely alpha passwords - Example I, this year had a fake facebook account with just simple plain password. So, it's not that every user in those huge Socio-networks is aware of that policy and risks if they aren't implemented.
Then secondly, is that in the case of 2FA, same applies to 'password strength choice'. 2FA is a feature which not every user would be happy to use, especially if one knows that it always requires (MUST) one to be close with their phones that right moment when they want to login when they'll send you a OTP for you to incorporate it within your login session. Therefore, most users do not apply/prefer this method.
So it's unlucky for someone who uses a fairly weak password and yet do not use 2FA login.
Well, in addition to that is that the password hashing algorithm used by a particular web app matters, the more complex and infamous it is, the more hard to crack it's hashes. For example if a site uses an AES 128 bit encryption scheme it would take you a huge considerable amount of time to crack it's hash. Unlikely to MD5, SHA1, and the likes hashing algorithm which everyone knows there are plenty of crackers and rainbow tables spread all across the cyberspace.
So bro, don't underestimate the power of bruteforce attacks as in their is no system which is 100% secure. So if a hacker succeeds to penetrate the other way round and get the passwords be it in hash or plaintext, what follows is that he would try to crack it to see if they are prone to successful bruteforce attack.
Kwanza siku hizi system zimetengenezwa zikikuforce uchanganye characters na numbers au uppercases na small cases.Bro, don't be silly, hmm? Bruteforce stills works especially in this world where still people prefer easily guessed and simple password patterns. For Your Information, bruteforce is the last resort to a hacker/pentester when all other hacking tactics have failed. So, please could you learn and practice more on this tactic to see how you can use it effectively in day to day penetration activities (if you are a pentester maybe).
Looks like you really don't have enough experience (if not necessary knowledge) with bruteforce and exploits writing.
Twende taratibu utaelewa...Sasa lugha
Bro, bruteforcing is still possible no matter how much measures will be put. Yes, I do agree with you that bruteforcing it's nearly useless in this era, but the point still stands that it's not that way you say that all social network users use strong password of combination of AlphaNumerals and special characters, i want to assure you that not all users care about any of those silly combinations, some use barely alpha passwords - Example I, this year had a fake facebook account with just simple plain password. So, it's not that every user in those huge Socio-networks is aware of that policy and risks if they aren't implemented.
Then secondly, is that in the case of 2FA, same applies to 'password strength choice'. 2FA is a feature which not every user would be happy to use, especially if one knows that it always requires (MUST) one to be close with their phones that right moment when they want to login when they'll send you a OTP for you to incorporate it within your login session. Therefore, most users do not apply/prefer this method.
So it's unlucky for someone who uses a fairly weak password and yet do not use 2FA login.
Well, in addition to that is that the password hashing algorithm used by a particular web app matters, the more complex and infamous it is, the more hard to crack it's hashes. For example if a site uses an AES 128 bit encryption scheme it would take you a huge considerable amount of time to crack it's hash. Unlikely to MD5, SHA1, and the likes hashing algorithm which everyone knows there are plenty of crackers and rainbow tables spread all across the cyberspace.
So bro, don't underestimate the power of bruteforce attacks as in their is no system which is 100% secure. So if a hacker succeeds to penetrate the other way round and get the passwords be it in hash or plaintext, what follows is that he would try to crack it to see if they are prone to successful bruteforce attack.
Dude you have no idea what you are talking about.
Huwezi bruteforce top websites, sahau, hata kama mtu ana weak passwords. The moment you start your script watadetect, unless your first password iwe the correct guess. Thinking unaweza tuma a thousand requests kwenye site kama instagram is pure stupidity. They'll detect and block your IP and Mac address all together as soon as you hit the 20th request.
Swala sio 2FA wala encryption algorithm wanayotumia, swala ni they will know you are trying to bruteforce the password na watakublock hapohapo, na ukilazimisha hata kama mwenye account hana 2FA wanailock wanalazimisha 2FA maana wameona mtu anajaribu sana kupenetrate. Jaribu hiyo tool yako kwenye account yako mwenyewe uone. Its completely useless. Tafuta njia nyingine sio bruteforcing passwords. Bruteforcing inafanya kazi kwenye mambo mengine ila hili la password kajaribu vistartup vya kijinga, hata JF tu hupiti.
nilikua na play around na huu ujinga miaka flani, crunch tool ya kali linux, natengeneza wordfile ya upto 5GB, za possible passwords, haha, ujinga ki ukweli Andy, hamna maana labda uwe na mnyama wa 80cores@10GHz ivi, na kama alivyosema Chief, wanafunga account ukifanya trial/error kijanjajanja
Uko vzuri bro.Developer wanasahau ya kuwa unaweza program system na security measures kama delaying making you can never program the user to be secure.Watu wanatumia password mmoja account zote na isitoshe password zao mostly ni majina yao au watoto au mwanamziki au vitu knowable making it possible to perform a smart brute forcing attack