dictionary attack


Also found in: Thesaurus, Medical, Legal, Encyclopedia, Wikipedia.
Related to dictionary attack: Brute force attack

dictionary attack

n
(Computer Science) an attempt to hack into a computer or network by submitting every word in a dictionary as a possible password
References in periodicals archive ?
However, CE has the threat of dictionary attack and poison attack.
Furthermore, text based passwords can be hacked by different methods such as dictionary attack, brute force method, phishing etc.
Offline Dictionary Attack. For most of the schemes, an adversary is unable to launch an offline dictionary attack in the login and authentication phase.
Algorithm 1 briefly summarizes our dictionary attack procedure.
But, longer passwords containing only a single word can be cracked using a dictionary attack.
More savvy users who choose a less common password might still fall prey to what is called a "dictionary attack." The cracking software tries each of the (https://en.oxforddictionaries.com/explore/how-many-words-are-there-in-the-english-language) 171,000 words  in the English dictionary.
The tools use dictionary attack, brute force attack, rainbow tables, or combined ways to quickly recover user account passwords in Oracle Database, MySQL, PostgreSQL and Microsoft SQL Server databases.
Using different IP addresses and a significant number of computers, the hackers will kick off an automated dictionary attack and after only a few short days, their campaign could be successful, with malware is installed on the victim's computer.
Hackers can use something called 'Dictionary attack' which searches all the common words used in dictionaries in any language to hack into your account." A surprising number of superheroes also made the Splash-Data list, with "superman" and "batman" on the list.
A dictionary attack will be carried out against WPA2-PSK, and subsequently a brute force attack, however, owing to the available resources a full scale brute force attack will not be carried out and as such only a proof of concept will be provided.
The software provides three types of Wi-Fi attacks: a WPA/WPA2 dictionary attack, WEP brute forcing and WPS PIN brute forcing.
Second, the protocol is vulnerable to an offline dictionary attack by a malicious client and thus other clients cannot be guaranteed of the security of their passwords.