An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct; if so, he continued the loop for consecutive characters. If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered are correct.
What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?
jinjection
Highly Voted 2 years, 9 months agoChaoticda
Highly Voted 2 years, 7 months agosteffBarj
Most Recent 1 year agoDaniel8660
1 year, 9 months agoDaniel8660
1 year, 10 months agodinonino
1 year, 10 months agodinonino
1 year, 10 months agoRachael_111
1 year, 10 months agoBlueteam
1 year, 10 months agothmsilverknight
1 year, 11 months agoMMtc
2 years ago_empty_
2 years, 1 month agocesarai
2 years, 2 months agosiskoch
2 years, 3 months agodjaBSNYVXSHGX
2 years, 3 months agoSteve0749
2 years, 5 months agoQudaz
2 years, 5 months ago