Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
3 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
How can a hacker try many multiples of possible passwords... (Original Post) LAS14 Tuesday OP
What you said it true, but most also have a lock time out. thatdemguy Tuesday #1
Thanks! Makes sense. nt LAS14 Tuesday #3
They usually use social engineering to get people to give them the passwords sboatcar Tuesday #2

thatdemguy

(586 posts)
1. What you said it true, but most also have a lock time out.
Tue Apr 22, 2025, 03:25 PM
Tuesday

Be it 1 or 5 mins you do get more tries on most systems.

What they really do is go after systems that dont lock it it. They then make a list of common passwords used by an email address and then start trying them on other sites.

So your forum you go to read about puppies does not lock it out, they get the password for that site. Then they start trying it on say wells fargo and citi bank etc. They dont need to know if you have a wells fargo account they just try it and every other bank. Most people who are not computer savy will have a few passwords they use a lot of places. Or variations of those passwords, like a place that requires 6 things and another place requires 8, a lot of people do things like add 12 to the 6 digit to get 8.

I am some what guilty of this, but use better variations.

sboatcar

(600 posts)
2. They usually use social engineering to get people to give them the passwords
Tue Apr 22, 2025, 03:37 PM
Tuesday

Brute force attacks where they just randomly try passwords are a lot less common. Usually they send out a phishing email that looks legit, someone enters their password, and boom, they can get it. People want to be trusting, so they don't think twice about it. I work in the industry and I'd say about 80% of all ransomware attacks start with someone basically giving them their password.

Latest Discussions»Help & Search»Computer Help and Support»How can a hacker try many...