Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Attack Types

Brute Force Attack

An attack method that systematically tries large numbers of passwords or cryptographic keys until the correct value is found, including variants like password spraying and credential stuffing.

Definition

A brute force attack is an automated method of defeating authentication or encryption by exhaustively testing possible values. In the context of authentication, this means trying passwords or PINs until access is granted. Three main variants exist: classic brute force (trying all combinations for a single account), password spraying (trying a small set of common passwords across many accounts to avoid lockout thresholds), and credential stuffing (replaying username/password pairs leaked from prior breaches against new targets). All three are facilitated by automation and are commonly observed in attacks against cloud identity providers, VPNs, and web applications.

Why It Matters

Brute force techniques remain highly effective because password hygiene across organizations is inconsistent and credential databases from prior breaches are widely available. Password spraying in particular is difficult to detect with per-account lockout policies because it deliberately stays below the failed-attempt threshold. Credential stuffing exploits password reuse — a pervasive problem — to achieve account takeover at scale without needing to crack anything. Compromised accounts obtained this way are used for Business Email Compromise (BEC), ransomware deployment, data exfiltration, and as pivot points for lateral movement.

How It Works

Classic brute force uses wordlists or character-space enumeration against a login endpoint. Password spraying distributes attempts across many accounts with a single password (e.g., 'Spring2024!') timed to avoid triggering lockouts — often one attempt per account per hour. Credential stuffing uses breach databases (e.g., from HaveIBeenPwned-indexed leaks) loaded into tools like Sentry MBA or SNIPR, which automate login attempts at scale against a target service. Detection relies on analyzing authentication logs for anomalous patterns: geographically dispersed login attempts, high volumes of failed authentications across many accounts, or successful logins from unfamiliar IP ranges following failed attempts.

DFIR Platform

BEC Investigation

The DFIR Lab BEC Investigation API's sign-in audit module detects brute force and password spray patterns by ingesting and analyzing Microsoft 365 sign-in logs for anomalous authentication activity — including distributed failed attempts, impossible travel, and spray-consistent timing patterns. See the [Sign-In Audit documentation](https://platform.dfir-lab.ch/docs/bec/signin-audit

View Documentation

Related Concepts

Credential HarvestingBusiness Email Compromise (BEC)Incident Response

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free