Techniques for Obtaining Passwords
Try default password used with standard accounts shipped with computer.
Exhaustively try all short passwords.
Try words in dictionary or a list of likely passwords.
Collect information about users and use these items as passwords: phone numbers, social security numbers, etc.
Use a Trojan horse to bypass restrictions on access.
Tap the line between a remote user and the host system.