How brute-forcer knows that the password is cracked for target username?
-
There are very many brute-force attacks (mostly for ‘admin’ username) on WordPress sites. All these attacks are made automatically via post requests.
The question 1: how brute-forcer knows that the password is cracked for target username?
The brute-forcer try the typical passwords like: ‘12345’, ‘qwerty’ etc. And often site administrators have username ‘admin’ with typical password and this username is cracked sometimes via brute-force. Limit-login attempts plugin solve this problem pretty good by the way.
The idea and question 2: if we know for sure that it is brute-force attack (javascript-test or cookie-test solve this because brute-force-bots are not usual browser clients) than is it good approach to tell brute-forcer nothing at all even if the password chosen correctly?
Discussion on wordpress.stackexchange.com
- The topic ‘How brute-forcer knows that the password is cracked for target username?’ is closed to new replies.