**BRUTE-FORCE-ATTACK** - the act of trying every possible combination of a given
keyspace or character set for a given length
**DICTIONARY** - a collection of commons words, phrases, keyboard patterns,
generated passwords, or leaked passwords, also known as a wordlist
**DICTIONARY-ATTACK** - using a file containing common or known password
combinations or words in an attempt to match a given hashing function's output
by running said words through the same target hashing function
**HASH** - the fixed bit result of a hash function
**HASH-FUNCTION** - maps data of arbitrary size to a bit string of a fixed size (a
hash function) which is designed to also be a one-way function, that is, a
function which is infeasible to invert
**ITERATIONS** - the number of times an algorithm is run over a given hash
**KEYSPACE** - the number of possible combinations for a given character set to the
power of it's length (i.e. charsetAlength)
**MASK-ATTACK** - using placeholder representations to try all combinations of a
given keyspace, similar to brute-force but more targeted and efficient
**PASSWORD-ENTROPY** - an estimation of how difficult a password will be to crack
given its character set and length
**PLAINTEXT** - unaltered text that hasn't been obscured or algorithmically altered
through a hashing function
**RAKING** - generating random password rules/candidates in an attempt to discover a
previously unknown matching password pattern
**RAINBOW TABLE** - a precomputed table of a targeted cryptographic hash function of
a certain minimum and maximum character length
**RULE** ATTACK - similar to a programming language for generating candidate
passwords based on some input such as a dictionary
**SALT** - random data that used as additional input to a one-way function
**WORDLIST** - a collection of commons words, phrases, keyboard patterns, generated
passwords, or leaked passwords, also known as a dictionary
**SALT** = random data that's used as additional input to a one-way function
**ITERATIONS** = the number of times an algorithm is run over a given hash
**DICTIONARY/WORDLIST ATTACK** = straight attack uses a precompiled list of words,
phrases, and common/unique strings to attempt to match a password.
**BRUTE-FORCE-ATTACK** attempts every possible combination of a given character
set, usually up to a certain length.
**RULE-ATTACK** = generates permutations against a given wordlist by modifying,
trimming, extending, expanding, combining, or skipping words.
**MASK-ATTACK**= a form of targeted brute-force attack by using placeholders for
characters in certain positions (i.e. ?a?a?a?l?d?d).
**HYBRID-ATTACK** = combines a Dictionary and Mask Attack by taking input from the
dictionary and adding mask placeholders (i.e. dict.txt ?d?d?d).
**CRACKING-RIG**= from a basic laptop to a 64 GPU cluster, this is the
hardware/platform on which you perform your password hash attacks.
[[Home]]
#reference
#concepts