Loading vulnerability page...

Interactive attack atlas

Choose any tab from the left. This walkthrough shows how weak passwords are attacked mechanically, then why MFA changes the ending.

Password attacks Mechanical guessing MFA defense
Mechanical password attack

Password Vault Story

Watch a weak key face brute force, dictionary guessing, breach reuse, and finally get stopped by a strong password with MFA.

Story animation
Press play to follow the lock, the attack methods, and the stronger defense.
User icon
Password-protected account
A lock is only as strong as its key.
User icon
Username
Password icon
Password
Thin silver key = weak password
Long complex key
Account Vault
Locked
Verification code needed
MFA blocks the attacker
Files Cards Private data
Hacker icon
Attack machine
Machines try what humans would never test manually.
Idle
----
Password123 Admin Guest Welcome1
Stolen from Website X
Key 1 Key 2 Key 3
Jackhammer attack
No match yet
Each scene here shows a different way attackers pressure a weak password: brute force, common-word lists, then credentials stolen from other sites.

Complex password + MFA changes the outcome

A weak or reused password can fall quickly, but a long unique password plus a phone-based second factor turns the same attack into a dead end.

Press play to see how a weak password gets pressured by different attack styles.

Quick understanding

1. The account is a locked vault, and the password is the key.
2. Brute force throws endless combinations at the lock.
3. Dictionary attacks try real words and common phrases more intelligently.
4. Credential stuffing reuses passwords stolen from other breaches.
5. One weak password can open the vault and expose everything.
6. A complex password plus MFA stops the final break-in.

Real ways to stay safer

Use long unique passwords for every account so one cracked or leaked password cannot unlock other sites.
Understanding

Password attacks are mechanical and data-driven. Machines can test huge numbers of guesses or reuse passwords from past breaches in seconds.

Why it matters

A single reused or weak password can unlock mail, money, work systems, and connected services if the same key keeps being used.

Defense mindset

Think in layers: long unique passwords, a password manager, MFA, login throttling, and breach monitoring all make the vault harder to crack.

Common signs

Rapid failed logins, reused passwords across sites, sudden breach alerts, or unexpected sign-in attempts are common warning signs of password abuse.

Brute forceDictionaryStuffingMFA