Brute force attacks systematically generate and test every possible password combination - or work through curated wordlists of likely guesses - until the correct credential is found. From a 4-digit PIN crackable in milliseconds to a properly hashed 16-character passphrase requiring longer than the universe's age, the math of keyspace is the only real defense.
Before a single password attempt is made, the attacker profiles the target system's authentication mechanisms: lockout thresholds, CAPTCHA presence, MFA enforcement, rate-limiting behavior, and username enumeration vulnerabilities. This reconnaissance determines which attack variant is viable and prevents wasted time on protected systems.
A generic wordlist cracks generic passwords. A skilled attacker builds a <em>target-customized</em> wordlist by gathering every piece of public information about the organization and its employees - company name, products, location, team names, sports teams in the area, and prior leaked passwords from the company's own employees - then applies mutation rules that reflect human password patterns.
FirstName+Year!!1 123 2024, capitalize first letter, common suffixesOnline brute force attacks target live login endpoints - Hydra and Burp Suite's Intruder handle HTTP, SSH, FTP, and hundreds of other protocols. Configuration defines the target URL, POST parameters, success/failure detection strings, thread count, and proxy settings for evasion. Hydra can attack 50+ simultaneous services in a single command.
The attack runs autonomously, methodically working through the wordlist. Each failure narrows the remaining keyspace. For online attacks, the critical constraint is rate - too fast triggers lockout or rate-limiting alerts; too slow takes days. The attacker balances speed against detection, often using low thread counts and proxy rotation to stay under the threshold of any alerting system.
When a target has account lockout policies, traditional brute force is self-defeating - too many attempts and the account locks. Password spraying inverts the approach: pick the 5 most likely passwords for a corporate environment and try them against every user account, staying below the lockout threshold for each individual account while still testing the entire population.
Winter2024!, Welcome1, CompanyName1!Hunter.ioAfter a database breach, the attacker has the hashed passwords locally - no rate limits, no lockouts, no network constraints. Hashcat leverages the parallel processing power of GPU arrays, testing hundreds of billions of hash candidates per second. The algorithm the target used for hashing determines everything: MD5 is shattered in hours, bcrypt survives for decades.
$2b$Traditional brute force leaves an unmistakable trail in authentication logs - a single account accumulating hundreds of failed login attempts. Password spraying is subtler, detectable only by looking at the population-wide failure rate rather than any individual account. Both leave patterns that SIEM rules and behavioral analytics can surface reliably.
| Length | Character Set | Keyspace | MD5 (200B/s) | bcrypt/12 (184/s) | Entropy | Verdict |
|---|---|---|---|---|---|---|
| 4 | Digits only (PIN) | 10,000 | < 1 millisecond | 54 ms | INSTANT | |
| 6 | Lowercase only | 308,915,776 | 1.5 ms | 19.7 days | INSTANT | |
| 8 | Lowercase only | 208,827,064,576 | 1.04 sec | 36 years | CRITICAL | |
| 8 | Mixed case + digits | 218,340,105,584,896 | 18 minutes | 38,000 years | HIGH RISK | |
| 10 | Lowercase + digits | 3.76 trillion | 5.2 hours | 646M years | MODERATE | |
| 12 | Mixed + digits + symbols | 19,770,609,664 trillion | 3.6 years | 3.4 Γ 10Β²ΒΉ years | SAFE (MD5) | |
| 16 | Full printable ASCII (95) | 4.4 Γ 10Β³ΒΉ | 6.9 Γ 10ΒΉβΈ years | Longer than universe | SAFE | |
| 4 | Random words (passphrase) | ~7,776β΄ = 3.6 trillion | 4.9 hours | 635M years | SAFE + MEMORABLE |