ComputersSoftware

What is account brute?

You probably heard the expression "brut accounts" more than once. But, most likely, you have no idea what that means. First of all, it's worth saying that these are user accounts in games, social networks, etc., which were obtained illegally, that is, hacked or stolen. Certainly, what is brutus, how it works, is difficult to understand, but we will try to do it. But first let's figure out how not to become another victim of intruders.

What is brutus, and how to protect it from it

So, there is a special software that allows you to find the correct passwords for existing logins, mails, etc. by the method of selecting combinations of numbers and letters. Of course, there are a number of features in the work of such programs. For example, the longer and harder the password, the longer it will be selected, everything can go so far that the brute will fail. As for the time, much depends on the computing power of the technology, the Internet connection. So, the process can last from several minutes and be delayed up to a day or more.

You've probably already figured out what brute accounts are. As for protection, then, as noted above, it is desirable to put a password that is difficult to remember for yourself. For example, RKGJH4hKn2. It is safe to say that hacking it will be quite problematic. In addition, it should be remembered that, for example, many identical letters do not give any effect, in the same way as the numbers. Everything should be confused and mixed, it is desirable to alternate upper and lower case letters.

What is the base for brutus

Of course, the program will not work if there is no data. So, if she has nothing to choose passwords, then she will not do it. A database is a set of passwords and logins. The more extensive this list, the more likely that the account will be hacked. Much depends on what combinations are present in it, that is, the more literate it is, the better. It is also worth noting that the database includes not only passwords, but also logins, since bruteforce, which in English means "brute force," can simultaneously select both.

It's worth noting that the file itself, in which all the records are stored, is large enough. The minimum length of the combination is 3 letters and numbers, the maximum length is 8-16, depending on the program and its version. Selection begins with the letter "A" and ends with the last letter of the English or Russian alphabets. That's basically all the information on the databases, which can be useful to you.

To whom and why is it necessary?

It is difficult to answer this question unambiguously. People try to hack accounts for many reasons. It can be just fun, the desire to read other people's letters, send invalid messages, etc. The whole point is that it's illegal. In addition, Brutus can be considered a real theft, and for this you need to answer. It is strongly discouraged to deal with such matters, especially since sometimes it is a waste of time.

Even if the account is hacked, it can be quickly and easily restored. It is especially easy to do this if you specified real data when registering. As for accounting, created in a hurry, then returning them back will be much more difficult. But, as practice shows, such accounts are not appreciated by hackers. There is no point in taking someone's account or mail, which has nothing useful, and you do not need to talk about it again.

Who deals with brute force?

It will not be superfluous to say that so-called hackers do it. This is the case with large-scale hacking. By and large, such people earn their living on this and do it very skillfully. And the scheme works as follows. With the help of brute, logins and passwords are selected (a certain amount), and then all this business is sold to customers. That is, hackers themselves do not practically use what they received illegally, but simply sell it. But who is the buyer, you ask?

It can be anyone. The only thing you can say is that they are engaged in buying a large number of accounts. Further, these accounts are sold to ordinary users, who then are surprised that he returned to his former owner. The same applies to the personal data of payment systems (Webmoney, Qiwi). In addition to the fact that it is possible to get a certain amount of money, such an account can be sold, especially if there are expensive certificates confirming the owner's competence.

A little bit about proxy servers for bruteforce

Any self-respecting hacker first of all thinks about how to protect himself. And since what he does is completely illegal, then this must be given special attention. We already know what brute is, and now I would like to say how the proxy server works. It will allow you to remain unnoticed during the hacking of accounts. In simple words, the IP address remains unknown. This is the main defense of people hacking into someone else's accounts.

But this is not all. After the account has been hacked, it is necessary to enter it. But even having the correct login and password, sometimes it's not easy. For example, changing the IP address involves sending a security code to the mail or phone, such a system is successfully used by Valve, in particular to protect their product called Steam. Of course, it has already become clear what a proxy is for brutus. Therefore, we can enter any account and not cause absolutely no suspicions, which makes the crime ideal.

Some useful recommendations

Do not repeat once again that the password should be long and complex. It is also not recommended to use your account in crowded places or at work, where anyone can use a computer or laptop. First, a special spy program can be used, which remembers which keys were pressed, as you understand, it will not be difficult to calculate the password.

But this is not all that you need to know about. It is advisable not to remember the password in the browser, since it can be intercepted. There are accounts where at the entrance immediately comes sms with the confirmation code on the mobile phone. Therefore, if it came, and you have nothing to do with it, change the password, and it is advisable to act as quickly as possible.

What is the difference between brute and checker?

So, let's see now, what is the difference between these two concepts. So, we have already decided that bruteforce allows you to pick up a login and password through a simple search from the dictionary (database). Consider an example of hacking a mail service. For example, we got access, and what to do next? As a rule, we are interested in information about accounts in social networks, online games, payment systems, etc. So, the checker checks the password from the mail that we already have, for coincidences.

In simple words, if it coincides, for example, with the one installed by Vkontakte, then we will find out right away. We can conclude that this will deprive us of an unnecessary headache. Consequently, the process is more automated and practically does not require our participation. Now you know what brute and checker are, and how these programs work.

Conclusion

Based on all of the above, you can draw some conclusions. The account must be used only on a personal computer when access to strangers is excluded. The same applies to connections to free Wi-Fi, as there is a possibility of interception of the data flow and subsequent theft of your account. Since you already know what a brute program is , then it will be much easier to protect you. As they say, who is aware, he is armed. Remember that how well protected your account depends on you. If you did everything right, you do not need to worry again, and it's unlikely you will need to know what the account brute is, and the nuances of the program.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.delachieve.com. Theme powered by WordPress.