Cybersecurity · 2026
How Hackers Guess Weak Passwords (And How to Stay Safe)
It's rarely a genius at a keyboard. Here's what's actually happening — and what stops it.
Most people picture hacking as some dramatic scene from a film — a hooded figure typing furiously in a dark room while code scrolls down the screen. The reality is far less cinematic and, honestly, a lot more unsettling. The majority of account breaches don't involve anything clever at all. They involve automated tools running through lists of common passwords while you sleep, and if yours is on that list, it's gone.
Understanding how password attacks actually work makes it obvious why certain habits matter. This isn't a fear-mongering piece — it's a practical breakdown of the methods used, why weak passwords fail so quickly, and the specific steps that actually make a difference.
The Four Main Ways Passwords Get Cracked
Before getting into each method, here's a quick overview. These aren't exotic techniques — they're widely used, automated, and run thousands of attempts per second without anyone actively watching.
| Attack Type | How It Works | Speed |
|---|---|---|
| Dictionary Attack | Tries common words and known passwords from lists | Very Fast |
| Brute Force | Tries every possible character combination systematically | Depends on Length |
| Credential Stuffing | Uses real username/password pairs leaked from other breaches | Very Fast |
| Phishing | Tricks you into handing over your password directly | Instant if Successful |
Let's go through each one properly.
1. Dictionary Attacks — Your Password Is Probably on a List
A dictionary attack doesn't mean someone flips through the Oxford English Dictionary. It means an automated tool runs through a pre-built list of millions of the most commonly used passwords, leaked passwords from previous data breaches, and predictable variations — all in seconds.
These lists are enormous and surprisingly accurate. The most popular passwords get reused by millions of people across different platforms, which means attackers know exactly where to start. If your password is anything like the examples below, it's almost certainly already on one of those lists.
# Passwords that appear on every major dictionary list
123456
password
password1
qwerty
iloveyou
admin
welcome
monkey
dragon
letmein
# "Clever" variations that are also on the lists
P@ssw0rd ← substituting letters with symbols
Passw0rd! ← adding a number and symbol at the end
Summer2024 ← season + year is extremely common
London123 ← city + numbers
YourName123 ← name + numbers
2. Brute Force Attacks — Why Short Passwords Fall in Seconds
Brute force is exactly what it sounds like — trying every possible combination of characters until one works. It sounds slow, but modern hardware is terrifyingly fast at this. A standard graphics card can attempt billions of combinations per second when running against a stolen password hash.
The length of your password matters enormously here. Adding even two or three characters doesn't just make it slightly harder — it multiplies the number of possible combinations by orders of magnitude. The difference between a 6-character and a 12-character password isn't twice as hard to crack. It's billions of times harder.
| Password Length | Character Types | Estimated Crack Time |
|---|---|---|
| 6 characters | Lowercase only | Under 1 second |
| 8 characters | Mixed case + numbers | A few minutes |
| 10 characters | Mixed case + numbers + symbols | Several hours |
| 14 characters | Mixed case + numbers + symbols | Centuries |
| 16+ characters | Random passphrase | Practically impossible |
3. Credential Stuffing — The Reused Password Problem
This is probably the most underestimated threat on the list — and the most common cause of account breaches that aren't the victim's "fault" in any traditional sense. Credential stuffing happens when a site you used years ago gets breached, your email and password combination leaks in that breach, and attackers then try that exact same combination on hundreds of other websites automatically.
If you use the same password across multiple accounts — even a strong one — a breach on any one of those sites potentially unlocks all of them. This is why security professionals are so specific about unique passwords per account: it's not paranoia, it's a direct response to how these attacks work.
# How a credential stuffing attack unfolds
1. Site A (e.g. an old forum) gets breached
2. Your email + password are in the leaked database
3. Attackers buy or download this database
4. Automated tools try your credentials on:
Gmail, Facebook, Amazon, PayPal, banking apps...
5. Any site where you reused that password is now compromised
# Check if your email has appeared in a breach:
→ Visit: haveibeenpwned.com (free, run by security researcher Troy Hunt)
4. Phishing — When the Password Isn't Guessed, It's Given
No password is strong enough to protect you if you type it into the wrong website. Phishing skips the technical cracking entirely — instead, attackers create a convincing fake login page for Gmail, your bank, or any service you use, and trick you into entering your credentials directly.
The quality of phishing attempts has improved dramatically. Modern phishing emails are often indistinguishable from legitimate ones at a glance — correct logos, realistic sender names, proper formatting. The giveaway is almost always the URL. The email looks like it came from your bank; the link goes somewhere that isn't your bank.
# Red flags that signal a phishing attempt
- Urgency: "Your account will be suspended in 24 hours"
- Unexpected: You didn't request this email
- Link mismatch: Hover over any link — does the URL match the sender?
- Generic greeting: "Dear Customer" instead of your name
- Misspelled domain: paypa1.com, g00gle.com, amazon-support.net
# What to do instead of clicking
→ Go directly to the site by typing the URL yourself
→ Log in from there to check if any alert is genuine
→ Never enter credentials from a link in an email
How to Actually Stay Safe — The Practical Checklist
Here's what actually moves the needle. These aren't theoretical best practices — they're the specific changes that directly counter each attack method described above.
✦ Use a Password Manager
Bitwarden (free, open-source) or iCloud Keychain (Apple devices) generates and stores a unique, random password for every account. You remember one strong master password; it handles the rest. This closes the door on both dictionary attacks (your passwords are random, not guessable) and credential stuffing (no two accounts share the same password).
✦ Enable Two-Factor Authentication on Important Accounts
Even if an attacker gets your password — whether through guessing, a breach, or phishing — 2FA means they still can't get in without a second code from your phone. Enable it on email first (since email is used to reset everything else), then banking, social media, and work accounts. Use an authenticator app (Google Authenticator, Authy) rather than SMS where possible — SMS codes can be intercepted through SIM-swapping attacks.
✦ Use Long Passwords — Length Beats Complexity
A 16-character random password is exponentially harder to brute-force than an 8-character one with symbols. If you're setting a password you need to remember (like your password manager master password), use a passphrase: four or five random unconnected words. Something like velvet-hammer-cloud-nine is both memorable and extremely resistant to cracking.
✦ Check If Your Email Has Been in a Breach
Go to haveibeenpwned.com and enter your email address. It's maintained by a well-known security researcher and tells you which known breaches your credentials appeared in. If any of those sites shared a password you still use elsewhere, change it immediately.
✦ Never Click Login Links From Emails
Build the habit of going directly to a site by typing the URL rather than clicking through email links. This works regardless of how convincing the email looks — phishing fails completely if you never follow its link.
| Attack | What Stops It | Effort Required |
|---|---|---|
| Dictionary Attack | Unique random passwords via password manager | One-time setup |
| Brute Force | 16+ character passwords / passphrases | One-time setup |
| Credential Stuffing | Unique password per site (no reuse) | Password manager |
| Phishing | Never click email links to log in + 2FA | Habit change |
Frequently Asked Questions
▸ Is a password manager itself a security risk — what if it gets hacked?
It's a fair concern, and the answer is: well-designed password managers encrypt your vault locally before it ever leaves your device. Even if the company's servers are breached, attackers get encrypted data they can't read without your master password — which only you know and is never stored anywhere. Bitwarden is open-source, meaning its security is independently verified by researchers. The practical risk of using a reputable password manager is significantly lower than the risk of reusing passwords across sites.
▸ My password is long but uses a phrase from a song or film — is that safe?
Probably not as safe as it feels. Common phrases, song lyrics, film quotes, and even Bible verses are included in advanced dictionary lists. "ToBeOrNotToBe" or "MayTheForceBeWithYou" are not strong passwords despite their length. The passphrase approach works when the words are genuinely random and unrelated — not a recognisable phrase. A password manager generating a random string is still the strongest option.
▸ Does changing my password regularly actually help?
This advice has largely been revised by security experts. Forcing regular password changes often leads to worse passwords — people cycle through predictable patterns like Summer2025, Summer2026. Current guidance is: use a strong, unique password and only change it when there's a reason to — such as a suspected breach, an account being compromised, or when Have I Been Pwned shows your credentials in a leak. Changing strong passwords on a calendar schedule doesn't meaningfully improve security.
▸ Is SMS two-factor authentication better than nothing?
Yes, meaningfully so — SMS 2FA stops the vast majority of automated attacks and is far better than no 2FA at all. Its weakness is SIM-swapping, where an attacker convinces your phone carrier to transfer your number to their SIM. This is rare and usually targets high-value accounts. For most people, SMS 2FA on email and banking is a solid improvement. If you want to go further, an authenticator app removes the SIM vulnerability entirely.
▸ What should I do first if I think my account has already been compromised?
Act quickly in this order: change the password on the compromised account immediately, then change it on every other account where you used the same password. Check your email inbox for any password reset requests you didn't send — that's a sign of wider access. Enable 2FA on your email account if it isn't on already. Then check haveibeenpwned.com to see if any recent breaches may have triggered this.
Conclusion
None of this requires technical skill to defend against. The attacks are automated and indiscriminate — they don't target you specifically, they just work through lists until something opens. That means the defences are equally straightforward: remove your accounts from those lists by using random passwords, remove the reuse risk by using a different one everywhere, and remove the phishing risk by building one simple habit.
The people who get breached aren't usually less intelligent — they just hadn't set these things up yet. An afternoon spent on a password manager and 2FA covers the overwhelming majority of the risk. That's a reasonable trade for not having to deal with a compromised account later.
Your action plan — in order of priority
1. Check haveibeenpwned.com — see what's already out there
2. Install Bitwarden — set a strong master password and start saving credentials
3. Enable 2FA on your email account — this is the most critical one
4. Never follow login links from emails — go direct, always
5. Gradually replace old passwords — let the manager generate them
Free tools. One afternoon. Done.