CAPEC 49 Password Brute Forcing

Draft Standard Medium Risk
Severity High

Description

An adversary tries every possible value for a password until they succeed. A brute force attack, if feasible computationally, will always be successful because it will essentially go through all possible passwords given the alphabet used (lower case letters, upper case letters, numbers, symbols, etc.) and the maximum length of the password.

Attack Execution Flow

2

Mitigations

3

Consequences

Indicators

1

Relationships

Related ATT&CK Techniques

1

Resources Required

1