{"id":2599,"date":"2023-02-04T21:02:18","date_gmt":"2023-02-05T05:02:18","guid":{"rendered":"https:\/\/tekedgeconsulting.com\/beta1\/?post_type=glossary&#038;p=2599"},"modified":"2023-02-16T14:37:47","modified_gmt":"2023-02-16T22:37:47","slug":"dictionary-attack","status":"publish","type":"glossary","link":"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/dictionary-attack\/","title":{"rendered":"Dictionary Attack"},"content":{"rendered":"\r\n<p>A dictionary attack is a systematic method of guessing a password by trying many common words and their simple variations. Attackers use extensive lists of the\u00a0most commonly used passwords, popular pet names, fictional characters, or literally just words from a dictionary \u2013 hence the name of the attack. They also change some letters to numbers or special characters, like \u201cp@ssw0rd\u201d.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>A dictionary attack is a systematic method of guessing a password by trying many common words and their simple variations. Attackers use extensive lists of the\u00a0most commonly used passwords, popular pet names, fictional characters, or literally just words from a dictionary \u2013 hence the name of the attack. They also change some letters to numbers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3418,"menu_order":0,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"cybocfi_hide_featured_image":"","footnotes":""},"glossary-categories":[119,118],"glossary-tags":[123,122],"class_list":["post-2599","glossary","type-glossary","status-publish","has-post-thumbnail","hentry","glossary-categories-passwords","glossary-categories-security","glossary-tags-passwords","glossary-tags-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/glossary\/2599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":2,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/glossary\/2599\/revisions"}],"predecessor-version":[{"id":3814,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/glossary\/2599\/revisions\/3814"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/media\/3418"}],"wp:attachment":[{"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/media?parent=2599"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/glossary-categories?post=2599"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/glossary-tags?post=2599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}