Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Ethical Hacking Assignment 13 Cryptography Objective: Using John the Ripper to crack passwords. Video: http://nweb.eng.fiu.edu/aperezpo/EEL4806n/labs/assign13.mp4 1) Use the https://www.md5hashgenerator.com/ to generate laser MD5 hash: ______________________

Ethical Hacking Assignment 13 Cryptography Objective: Using John the Ripper to crack passwords. Video: http://nweb.eng.fiu.edu/aperezpo/EEL4806n/labs/assign13.mp4 1) Use the https://www.md5hashgenerator.com/ to generate laser MD5 hash: ______________________ Use the https://crackstation.net/ to crack the previous MD5 hash and show a screenshot. 2) Access the file called hash.txt in your Kali home directory that was obtained from a Windows XP machine. Use that file to crack the password contained within it. Run John the Ripper using john and write down the passwords that it discovered: _______________________________________ _______________________________________ _______________________________________ 3) What are Rainbow Tables? _____________________________________________________________________________________ _____________________________________________________________________________________ 4) Discuss and contras the difference between LM and NTLM (weakness), used on Windows, what is the hash algorithm typically used in Linux? _____________________________________________________________________________________ _____________________________________________________________________________________ 5) Compare a substitution and a transposition cyber? _____________________________________________________________________________________ _____________________________________________________________________________________

6) Using the Caesar Cipher C = E(4,P) = (P+4)Mod 26, what is the ciphertext for the plaintext below: Plaintext = FIU Ciphertext = ____________________________

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Communications and Networking

Authors: Behrouz A. Forouzan

5th edition

73376221, 978-0073376226

More Books

Students also viewed these Computer Network questions