Brute Force Attack: Hackers systematically try all possible password combinations until finding the correct one.Dictionary Attack: Hackers use precompiled lists of common passwords and phrases to guess the password.Phishing: Attackers trick users into revealing passwords through fake emails, messages, or websites.Keylogging: Hackers use malware to record keystrokes and capture passwords as they are typed.Credential Stuffing: Hackers exploit reused passwords from data breaches to gain unauthorized access to multiple accounts.