1 00:00:00,060 --> 00:00:06,690 Hello and welcome to this tutorial, our first method is brute force attack, and this is the TOTY part 2 00:00:06,690 --> 00:00:11,910 of brute force attack before proceeding to the practical part, you must know answers of. 3 00:00:13,170 --> 00:00:16,140 Our first question is what is brute force attack? 4 00:00:17,250 --> 00:00:24,150 A brute force attack is a trial and error method used to obtain information such as user password or 5 00:00:24,180 --> 00:00:24,780 a PIN. 6 00:00:25,820 --> 00:00:32,750 That is personal identification number in a brute force attack, automated software used to generate 7 00:00:32,750 --> 00:00:37,400 a large number of consecutive guesses as to the value of the desired data. 8 00:00:37,880 --> 00:00:42,740 This method drives each and every possible combination to get the desired password. 9 00:00:43,900 --> 00:00:51,910 Our second question is, what is brute force decryption by password guessing this method is a very fast 10 00:00:52,240 --> 00:00:56,620 when used to check all your passwords, but for longer passwords. 11 00:00:56,770 --> 00:01:01,810 Other methods such as dictionary attack, are used because of brute force. 12 00:01:01,810 --> 00:01:03,160 Attack takes too long. 13 00:01:03,550 --> 00:01:07,420 Now, our third question is, how does a brute force attack work? 14 00:01:08,080 --> 00:01:14,650 A brute force attack would likely start at one digit password before moving to the two digit password 15 00:01:15,010 --> 00:01:19,420 and so on, trying all possible combinations until one works. 16 00:01:20,380 --> 00:01:24,850 And our last question is, how long does it take to crack a digit password? 17 00:01:25,750 --> 00:01:31,240 Well, it depends on which type of password you want to crack, simple or complex one. 18 00:01:31,810 --> 00:01:37,420 It takes around six hours to eighty four days depending upon the password used. 19 00:01:38,320 --> 00:01:42,120 And it is the weakest method among the three methods I have chosen. 20 00:01:43,630 --> 00:01:49,990 But when other attacks failed to crack the password, then brute force attack is the last hope of attackers 21 00:01:49,990 --> 00:01:50,860 and protesters. 22 00:01:51,610 --> 00:01:56,890 Now, at the end of this tutorial, I want to tell you about the sequence of matters explained in this 23 00:01:56,890 --> 00:01:57,250 schools. 24 00:01:58,390 --> 00:02:02,280 I have placed matters according to their capacity to correct the security. 25 00:02:02,770 --> 00:02:04,280 That is my method. 26 00:02:04,300 --> 00:02:09,280 Number one is the simplest and less effective than the remaining two matters. 27 00:02:09,760 --> 00:02:14,860 My second method is more powerful than the first one, but less effective than my third method. 28 00:02:14,860 --> 00:02:18,970 And my last method is the most powerful to crack the security of any. 29 00:02:18,980 --> 00:02:26,440 Vyvyan, never underestimate any of these methods because who knows which method works in a specific 30 00:02:26,440 --> 00:02:27,100 situation. 31 00:02:27,460 --> 00:02:30,160 OK, so that's it for this tutorial.