Brute Force Attacks: How Attackers Crack Passwords and How to Stop Them

Brute Force Attacks use exhaustive trial-and-error to guess authentication credentials — usernames, passwords, credit-card numbers, or cryptographic keys — by systematically testing all possible combinations.

Normal vs Reverse Brute Force

TypeMechanism
NormalSingle username tested against many passwords
ReverseMany usernames tested against one common password (e.g., “123456”)

Session ID and URL Parameter Attacks

Beyond login credentials, brute force tools can target session IDs in URLs, iterating thousands of values to find valid sessions or access unauthorised resources.

http://exampledoc.com/note.jsp?msgID=12345
← attacker iterates msgID values to read other users' messages

Prevention Techniques

  • Use long, truly random passwords not based on dictionary words.
  • Change passwords frequently to limit exposure after a compromise.
  • Block IPs attempting access to more than three accounts simultaneously.
  • Restrict failed login attempts before triggering account lockout or a time delay.
  • Destroy the session after too many consecutive retries.
  • Monitor HTTP POST requests from login forms for anomalous volumes.
  • Review server log files regularly for suspicious login patterns.

SMTP-AUTH: Securing Email Transmission and Preventing Spam Relay

SMTP was designed without any security features — messages are transmitted as unencrypted ASCII and can be easily forged. There is no mechanism for verifying sender identity or message integrity. SMTP-AUTH addresses this by requiring clients to authenticate with the mail server before sending.

SMTP Security Risks Without AUTH

  • Email messages can be read by any party along the routing path.
  • Messages can be forged with a fictitious or stolen “From” address.
  • No message integrity or sender verification guarantees exist.
  • SMTP flooding attacks overwhelm servers by opening massive numbers of simultaneous connections.

SMTP-AUTH Benefits

  • Allows legitimate users to send mail from any IP worldwide — essential for mobile workers.
  • Denies relay service to spammers and unauthorised users.
  • Supports alternate SMTP ports, bypassing ISP blocks on the default port 25.
  • Creates an audit trail for tracing the source of spoofed or abusive email.