1 Brute Force Attack Types
Authentication endpoints without rate limiting are vulnerable to several automated attack types that systematically guess credentials.
Classic brute force: Trying all possible passwords for a known username. Slow but exhaustive — works against short or simple passwords.
Dictionary attack: Testing a wordlist of common passwords (rockyou.txt has 14 million entries). Fast and effective against human-chosen passwords.
Credential stuffing: Using breach databases (billions of pairs). Exploits password reuse across sites.
Password spraying: One common password (like "Winter2024!") tested against many accounts. Avoids per-account lockout. Often successful in corporate environments with predictable password policies.
Reverse brute force: Fix the password, enumerate usernames — useful when a common default password is suspected.
Without rate limiting, a typical server can handle thousands of login attempts per second, making all of these attacks trivially fast.