borka wrote:oh you sure can tell me how it works ...
Well, as far as I recall (Sorry if it's wrong) bruteforce just tries literally every combination until it succeeds, and something else does wordlists.
Actually, I just googled it.
Such an attack might be utilized when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier. It consists of systematically checking all possible keys or passwords until the correct one is found.
So yeah, something else uses wordlists, not sure what.