fbpx

How to Avoid the Most Common and Dangerous Passwords

Passwords is generally the first layer of security and authentication, password cracking techniques are very common the best techniques are guessing, dictionary based attack, brute force attack. There are so many tools are available to implement password cracking attack, backtrack and specially backtrack 5 contain different tools for online and offline password cracking. If your password is easy than a hacker or cracker can easily hack it by using guessing or other attack. Password cracking tutorial by using hydra so by looking at the tutorial you can easily understand about the weak and strong passwords.


So what are the most common and insure passwords? How to secure yourself ? How to Avoid the Most Common and Dangerous Passwords? The inforgraphic will tell you the answers.



Password cracking
Infographic by Zone Alarm




Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What are Online Casinos doing to be as Safe and Secure as Possible?

Online casinos have continued to increase in popularity over recent years as more and more gamblers have turned to virtual options to further enhance...

Reconnaissance for Bug Bounty Hunters & Pentesters

New to the bug bounty and confused about where to start? Worry not! This reconnaissance for bug bounty hunters guides you to take the...

Access & Manage Android Phone Remotely – L3MON Tutorial

There is software available, like Metasploit, to gain remote access to any android phone. But other than that, we have the L3MON tool (A...

How to Hide Shellcode Behind Closed Port?

Every company has a variety of scanners for analyzing its network and identifying new or unknown open ports. It's unthinkable to disguise the potentially...