password hacking techniques

8 Famous Password Hacking Techniques Used By Hackers

Password Cracking Techniques: – We can use phishing and RAT’s to hack password of accounts, pc and smartphones. But there are lots of passwords hacking techniques used by hackers around the world.

We will be learning some best password hacking methods used by hackers and how these methods work. In the end, we will also learn about some password cracking countermeasures, that you can use to make your password even more secure.

Avast Secureline VPN Honest Review

Password Cracking Methods

These are some best password hacking techniques used by hackers.

Dictionary Attack

Dictionary method of password hacking is really famous these days.

In this method, hackers make wordlist in a text file with some common passwords, words or list of some guessed passwords.

Then they use any tool to perform this attack using that wordlist. The tool will automatically test every word in wordlist until they found the real password.

Brute Force Attack

Brute force attack is similar to a dictionary attack, but with a difference.

In brute force attack, hackers use a tool which automatically try every combination of words, characters and symbols until they find the real password.

It’s like, first they will try admin1 -> admin2  -> admin3 and this series goes on until they come across the actual password.

Best VPN Apps For Android

Rainbow Tables Attack

Every plain text password is stored in hashes in the computer. Rainbow Table Attack uses a list of pre-computed hashes (and hashes of all possible password combination of any algorithm) and then compare those hashes.

See also  How to Hack Facebook Account Using ZShadow

This method takes less time to crack a password.

Phishing Attack

Another way to hack password is to directly ask for it from the victim? I know it’s stupid. But if you are a regular reader of this site then you already know what I mean.

In a phishing attack, a hacker makes a fake web page and then trick the victim into login on that fake page and when victim logs in, hacker gets the password.

This method is my favorite, all you have to do is to make a phishing page and then trick the user to login by using somethings you already know about them. Besides this, the phishing method is fun for me.

How To Start Learning Ethical Hacking


Hackers use keyloggers and screenscrappers to easily get plain text password of anyone from computer or smartphone.

Hackers simply install keylogger program in any computer or smartphone and then keylogger starts its work. It will start recording every keystrock from victim’s computer or phone’s keyboard and in the meantime; it will also capture the password and send the data back to the hacker.

Remember some time ago, I told you about hacking android phone using Spynote and Ahmyth RAT. Keylogger option is available in those RAT programs. You can use them.

How to Hack Android Phone Using Ahmyth RAT

How To Hack Android Phone Using Spynote RAT

How To Hack Android Using Kali Linux

On the other hand, screenscrapper programs keep capturing screenshots of victim’s screen and hackers gets them all. Chances are it’ll also capture the password.

See also  What is Schema in Database? Types of Database Schema and Its Examples

Besides this, using screenscrapper just for capturing passwords is not enough use of it, you can also use these kinds of programs for surveillance.

Password Guess

The first step of ethical hacking and is Information Gathering, in which they collect as much information as possible about the target.

Hackers also use this information to guess password. For a normal computer and smartphone victim, who is not so tech-savvy, this technique mostly works.

Windows 10 Bluetooth Activation Problem

Social Engineering

In Social Engineering, hackers mostly pretend to be a tech support guy and then call or interact with their victim and directly ask them for a password to manage the network or system.

Or they can also ask for some access to specific services or apps, which can be used to hack password.

Shoulder Surfing

In shoulder surfing, you need to stand behind the victim while they are entering their password. It could help you in two ways.

Either you will get a password or you will get some information about password which can be used to create a wordlist and perform dictionary or brute force attack.

Netcat Tutorial For Windows and Kali Linux

Password Hacking Countermeasures

The weakest thing in any security system are  humans, because anyone can manipulate us and get information related to password or anything.

As Elliot told us in Mr Robot  “I have never found it hard to hack most people. If you listen to them, watch them. Their vulnerabilities are like a neon sign screwed into their heads.” – Tweet This

See also  How to Setup Ethical Hacking LAB Using Virtual Box

So, it is your responsibility to keep your password safe.

– Don’t use the same password to login on sites or apps you use.

– Make your password combination of uppercase letters, lowercase letters, numbers, and symbols.

– Length of your password should be more than 7 characters.

– Don’t share your password with anyone, even if it’s your family member or girlfriend or ex-girlfriend.

– Double-check if it is a real webpage or site where you are trying to login.

– Don’t save your password in the browser after signing in.

– Clear browser cookies and saved passwords on regular basis.

Friends, of course, we can not stop a hacker? But yeah we can slow them down using above countermeasures and tips.

How To Use NMap To Scan For Open Ports

What is your favorite password hacking technique?

So, these were some of the best techniques and tricks used by hackers to hack passwords.

Among all of these techniques, my favorite was Phishing and Keylogger or Screenscrappers and using some social engineering tricks.

Tell me through comments, What is your favorite password cracking method??

Follow us on Facebook, Twitter, Instagram and do subscribe to our email newsletter to learn hacking and get latest updates in your inbox.

Also, share this with your friends using the below buttons and help them secure their password.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top