The HTTP specification provides two parallel authentication mechanisms:

  1. Basic HTTP AUTH is used to authenticate the user to the HTTP server.

  2. Proxy Server Authentication is used to authenticate the user to an intermediate proxy server.

There are several types of password attacks, such as:

Password Attack Type
Dictionary attack
Brute force
Traffic interception
Man In the Middle
Key Logging
Social engineering

Brute Force Attack

Does not depend on a wordlist of common passwords but it works by trying all possible character combinations for the length we specified.

Relying completely on brute force attacks is not ideal, and this is especially true for brute-forcing attacks that take place over the network, like in hydra.

Dictionary Attack

Dictionary Attack tries to guess passwords with the help of lists.

We can find password wordlists in our SecLists in /opt/useful/SecLists/Passwords/, and username wordlists in /opt/useful/SecLists/Usernames/.

Methods of Brute Force Attacks

There are many methodologies to carry a Login Brute Force attacks:

AttackDescription
Online Brute Force AttackAttacking a live application over the network, like HTTP, HTTPs, SSH, FTP, and others
Offline Brute Force AttackAlso known as Offline Password Cracking, where you attempt to crack a hash of an encrypted password.
Reverse Brute Force AttackAlso known as username brute-forcing, where you try a single common password with a list of usernames on a certain service.
Hybrid Brute Force AttackAttacking a user by creating a customized password wordlist, built using known intelligence about the user or the service.