Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

7 . 1 P Password recovery On a seized computer, you find a suspicious file DeakinWeb . zip which is password protected. You suspect that

7.1P Password recovery
On a seized computer, you find a suspicious file DeakinWeb.zip which is password
protected. You suspect that there are some sensitive users hash values inside.
Please use what you learnt this week to open the zip file and crack the hash values. Report
your findings by preparing a document and listing the tools you used and the steps you took
with screenshots.
Submit your attempt (.pdf) to onTrack.
The following Reflection task is for SIT703 students ONLY:
1. Please explain the difference between LM hash and NT hash;
2. Besides of the OphCrack program introduced in this weeks workshop, please use
any other TWO tools/programs to crack the following 3 hashes.
0dbc75ca710e732c944e2df489a880e4:192c670d242fe23e0e7f3ac4061b94aa
050b44b3930b270253bac0fa79a61dc4:714b6fe38e859afb64674beb90dc69e6
732fb77c95422bc51486235a2333e4d2:89f792bbf84ea3898cf30f49d8c814e2
Record which hash can/cannot be cracked by OphCrack and the two tools/programs
of your choice. Why?
Report your findings and list the tools/programs you used and the steps you took with
screenshots. Combine your answers to the above two tasks (Password recovery task and
Reflection task) in one pdf and submit to onTrack.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions