- By extracting metadata from publicly accessible documents.
- Profiling allows you to tweak your wordlists so that they are specific to your target, thus eliminating the need to use large wordlists, which are time-consuming.
- John the ripper.
- Online password attacks are aimed at active network-based services, which introduce risks of detection. Offline password attacks are done when passwords are extracted and can be cracked on a separate system.
- Using tools that reside in memory do not write anything to the disk, and these are more stealthy than using tools that write data to the disk.