An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct; if so, he continued the loop for consecutive characters. If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered are correct.
What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?
jinjection
Highly Voted 2 years, 6 months agoChaoticda
Highly Voted 2 years, 4 months agosteffBarj
Most Recent 9 months agoDaniel8660
1 year, 6 months agoDaniel8660
1 year, 7 months agodinonino
1 year, 7 months agodinonino
1 year, 7 months agoRachael_
1 year, 7 months agoBlueteam
1 year, 7 months agothmsilverknight
1 year, 8 months agoMMtc
1 year, 9 months ago_empty_
1 year, 10 months agocesarai
1 year, 11 months agosiskoch
2 years ago[Removed]
2 years agodjaBSNYVXSHGX
2 years ago[Removed]
2 years, 1 month ago