Como funciona um ataque por força bruta?

Fonte da imagem ilustrativa https://www.thesslstore.com

┌──(kali㉿localhost)-[~]
└─$ ls
pdf-com_senha.pdf
┌──(kali㉿localhost)-[~]
└─$ pdf2john pdf-com_senha.pdf > pass.john
┌──(kali㉿localhost)-[~]
└─$ john pass.john
┌──(kali㉿localhost)-[~]
└─$ john pass.john
Using default input encoding: UTF-8
Loaded 1 password hash (PDF [MD5 SHA256 RC4/AES 32/64])
Cost 1 (revision) is 4 for all loaded hashes
Cost 2 (iteration count) is 65536 for all loaded hashes
Will run 2 OpenMP threads
Note: This format may emit false positives, so it will keep trying even after finding a possible candidate.
Press 'q' or Ctrl-C to abort, almost any other key for status
4321           (pdf-sample_encrypted.pdf)
1g 0:00:00:01 DONE (2024-06-09 09:00) 0.5588g/s 2811p/s 2811c/s 2811C/s 4321..*7¡Vamos!
Session completed
┌──(kali㉿localhost)-[~]
└─$

Escrito por Jeiel Lima Miranda.