1 00:00:00,240 --> 00:00:02,230 Hello and welcome to this tutorial. 2 00:00:02,250 --> 00:00:04,440 This is a total part for dictionary attack. 3 00:00:05,130 --> 00:00:07,110 Now, what is this study attack? 4 00:00:08,650 --> 00:00:15,720 This attack is a technique or method used to bridge the computer security of a password protected machine 5 00:00:16,380 --> 00:00:17,460 or server. 6 00:00:18,380 --> 00:00:23,960 Additionally, attack attempts to defeat an authentication mechanism by systematically entering each 7 00:00:23,960 --> 00:00:30,830 world, in addition as a password, are trying to determine the decryption of an encrypted message or 8 00:00:30,830 --> 00:00:31,400 document. 9 00:00:32,000 --> 00:00:39,390 Dictionary attacks are often successful because many users and businesses use ordinary words as passwords. 10 00:00:39,890 --> 00:00:44,330 These ordinary words are easily found in ordinary, such as an English dictionary. 11 00:00:46,470 --> 00:00:49,850 Now, what are the limitations of this attack? 12 00:00:51,380 --> 00:00:54,260 There are three main limitations of a dictionary attack. 13 00:00:55,190 --> 00:00:57,350 First one is delayed response. 14 00:00:57,800 --> 00:01:03,020 The second is account locking and the third is use of multiple word password. 15 00:01:03,710 --> 00:01:10,400 Frosties delayed response, a slightly delayed response from the server to prevent the hacker or spammers 16 00:01:10,400 --> 00:01:13,740 from checking multiple passwords within a short period of time. 17 00:01:14,660 --> 00:01:19,790 Second is account locking, locking in account after several unsuccessful attempts. 18 00:01:19,790 --> 00:01:25,670 For example, locking after three or five unsuccessful attempts prevents a hacker or spammer from checking 19 00:01:25,670 --> 00:01:27,260 multiple passwords to login. 20 00:01:29,000 --> 00:01:34,820 And the last limitation is dictionary attacks are not effective against systems that may use multiple 21 00:01:34,820 --> 00:01:36,160 words as password. 22 00:01:36,590 --> 00:01:40,310 And there are some similarities between dictionary and brute force attack. 23 00:01:40,880 --> 00:01:44,090 Both dictionary and brute force attack are guessing adex. 24 00:01:45,260 --> 00:01:52,160 They are not directly looking for a flaw or bypass either can be online or offline attack, you can 25 00:01:52,160 --> 00:01:57,700 easily find a password dictionary online ranging from one M.B to 97 GB. 26 00:01:58,730 --> 00:02:00,480 So that's it for the to part. 27 00:02:00,500 --> 00:02:02,030 See you in the practical session.