CIP Cyber

Hack any website | Brute Force Attack Using Firefox

Table of Contents

What is Brute Forcing ?

Brute force is a technique in which a hacker tries random passwords ( which are generated by application or via using password dictionary ). Brute force is sometimes known as brute force cracking. This attack is basically a trial and error attack . 


Passwords in Brute Force Attack : 

Brute force attacks mostly need a password file . This file  is a simple text file which contains passwords. Password file has randomly generated passwords. Some hackers also use dictionary as a password file . So it is always recommended that you don’t use dictionary words.

How to Perform Brute Force Attack :

Pre-requisite :

Firefox browser

Attack :

  1. Download and install firefox browser ( links given below )
  2. Download fireforce plugin for firefox ( links given below )
  3. Install and activate fireforce plugin 
  4. Restart Firefox Browser ( close and reopen )
  5. Go to the login page 
  6. Enter random username and random password ( we need error message that appears if we enter wrong password )
  7. Copy error message ( copy and wait )
  8. Enter Username ( in most cases usernames are admin , administrator , user , superuser , etc )
  9. Right click on the password field 
  10. Go to Fireforce 
  11. Select attack type ( more information below ) eg. generate password , load dictionary , etc
  12. Wait until password is cracked.

Attack Types

Generate Passwords :

If you select generate password , you will be given randomly generated password combinations for eg. AA , AB , AC , AD , AE , … AZ , etc. This type of attack takes time .

Load dictionary :

In this case you will have to select password file ( list of password ) which is a text file. Download links to all password files are given below.


Download Links :

Full Video Tutorial for Beginners :

+++++++++++++++++++++++

About Author :

Priyank Gada 

CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Do Hackers Really use Metasploit? NO!

Undoubtedly, Metasploit is one of the most organized, well-developed tools in the pen-testers toolbox. But, do hackers use it? Some of them, but not the

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings