Hacksenkessel's Blog
In most scenarios usernames are public and easy to discover, but passwords are hidden or somehow encrypted. There are different attack vectors for gaining access to a protected area, some more sophisticated than others, some of them don’t even need to gue...