
The first trick of hackers is the 'dictionary attack'. This method utilizes common phrases, combined with lists of frequently used passwords, along with popular names. For instance, in 2009, RockYou suffered a system breach, leaking 30 million password combinations onto the internet. With this abundance of passwords, hackers can devise tactics to crack passwords more easily, based on familiar phrases within the security realm.On the other hand, a 'mask' is another technique, using predefined rules to minimize the time spent cracking a password. These rules vary widely, such as passwords starting with uppercase letters, or ending with a special character, or containing two or three digits. These are examples of 'masks'.As for 'rule', it's more intricate than a 'mask'. When employing the 'rule' method, hackers combine both 'mask' and 'dictionary attack' to create complex rules that reduce the time taken by GPU and password guessing software. For example, a password using a common dictionary phrase, combined with two digits, or mixing their name with special characters. Utilizing this method is definitely faster than brute-forcing through each character in a password string, which is both time-consuming and inefficient.Thanks to this 'rule' technique, password management services become incredibly efficient. They not only generate lengthy password strings but also employ much more complex character rules, sometimes without following any pattern, vastly different from the passwords we usually come up with.
According to Techspot
