See Our team

Wondering how we keep quality?

Got unsolved questions?

Ask Questions

Engineering
GATE
CBSE
NCERT
Psychology
English
Computer
Constitution
Astrology
Yoga
Economics
Physics
Biology
Electronics
Microprocessor
Career
Interview
Anatomy
Botany

IP-spoofing-->View question

By:mmodi1995

Taged users:

|Fututron|Aparna-Dasgupta|

Likes:

|prabhat2346

Dislikes:

Be first to dislike this question

Talk about thisDelete|Like|Dislike|

thegdx

Likes:

Be first to like this answer

Dislikes:

Be first to dislike this answer

Talk about this|Once you have earned teacher badge you can edit this questionDelete|Like|Dislike|

------------------------------------

## What is brute force attack?

Explain in brief.By:mmodi1995

Taged users:

|Fututron|Aparna-Dasgupta|

Likes:

|prabhat2346

Dislikes:

Be first to dislike this question

Talk about thisDelete|Like|Dislike|

## Answers

Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.Just as a criminal might break into, or "crack" a safe by trying many possible combinations, a brute force cracking application proceeds through all possible combinations of legal characters in sequence. Brute force is considered to be an infallible, although time-consuming, approach.

thegdx

Likes:

Be first to like this answer

Dislikes:

Be first to dislike this answer

Talk about this|Once you have earned teacher badge you can edit this questionDelete|Like|Dislike|

------------------------------------

## Use Me ?