Brute Force Attack
Also known as: Brute-force attack, Password guessing attack
An attack that tries a large number of passwords, keys, or codes against a login or encryption endpoint until one works.
Last updated:
What is a brute force attack?
A brute force attack systematically submits candidate passwords, keys, or codes against a target — a login form, an SSH server, a password-protected archive, an API key check — until one succeeds or the candidate list is exhausted. The attacker does not exploit a vulnerability in the code; they simply exploit the fact that the authentication endpoint accepts attempts and the password is guessable within a reasonable budget.
Common brute force variants
- Pure brute force — exhaustively try every combination in a keyspace. Only feasible against short passwords or weak ciphers.
- Dictionary attack — try a list of common passwords (
password123,qwerty, leaked-password wordlists). Much faster than pure brute force and effective against most human-chosen passwords. - Hybrid — combine a dictionary with small mutations (append years, swap letters for numbers).
- Credential stuffing — try username-password pairs from data breaches against other services where the same users may have reused the same password.
Bulk brute force is often distributed across a botnet so each source IP stays under the rate-limit threshold of the target.
How brute force traffic is detected
Defenders look for a high ratio of failed-to-successful logins from a single IP, CIDR block, or ASN, plus the familiar fingerprint of SSH scanning on port 22 or repeated 401/403s on login endpoints. Rate limiting, account lockout, CAPTCHA, and MFA all raise the cost of brute force enough to make most automated campaigns uneconomic. Checking source IPs in an IP abuse report checker confirms whether an attacker is already known to other targets.