This trial-and-error method of guessing login information can be very effective and time-consuming since it covers all the potential combinations. Depending on the length and complexity of the password, cracking it can take anywhere from a few seconds to many years. It’s an unsophisticated yet effective way for hackers to penetrate private networks, websites, and databases if they have enough computing power
Brute force attacks are not new—hackers have been using this strategy as far back as computers have existed—but they remain popular today. After all, sometimes, the most straightforward tactics can result in successful breaches. An example would be when a hacker uses extensive data mining techniques coupled with dictionary files filled with common words such as “P@ssw0rd!” in hopes of discovering user passwords; this is known as a dictionary/wordlist attack. The goal here is always to gain unauthorized access to systems intended only for users.
More info: How to Prepare for a Phone Interview