This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

OAT-007 Credential Cracking

Jump to: navigation, search

This is an automated threat. To view all automated threats, please see the Automated Threat Category page. The OWASP Automated Threat Handbook - Wed Applications (pdf, print), an output of the OWASP Automated Threats to Web Applications Project, provides a fuller guide to each threat, detection methods and countermeasures. The threat identification chart helps to correctly identify the automated threat.


OWASP Automated Threat (OAT) Identity Number


Threat Event Name

Credential Cracking

Summary Defining Characteristics

Identify valid login credentials by trying different values for usernames and/or passwords.

Indicative Diagram

OAT-007 Credential Cracking.png


Brute force, dictionary (word list) and guessing attacks used against authentication processes of the application to identify valid account credentials. This may utilise common usernames or passwords, or involve initial username evaluation.

The use of stolen credential sets (paired username and passwords) to authenticate at one or more services is OAT-008 Credential Stuffing.

Other Names and Examples

Brute-force attacks against sign-in; Brute forcing log-in credentials; Brute-force password cracking; Cracking login credentials; Password brute-forcing; Password cracking; Reverse brute force attack; Username cracking; Username enumeration

See Also


CAPEC Category / Attack Pattern IDs

  • 16 Dictionary-based Password Attack
  • 49 Password Brute Forcing
  • 70 Try Common(default) Usernames and Passwords
  • 112 Brute Force

CWE Base / Class / Variant IDs

  • 307 Improper Restriction of Excessive Authentication Attempts
  • 799 Improper Control of Interaction Frequency
  • 837 Improper Enforcement of a Single, Unique Action

WASC Threat IDs

  • 11 Brute Force
  • 21 Insufficient Anti-Automation
  • Abuse of Functionality

OWASP Attack Category / Attack IDs