Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Exercise 3 : Personalised dictionary attack You found a hash value and the salt corresponding to the password of a user in another leaked database

Exercise 3: Personalised dictionary attack
You found a hash value and the salt corresponding to the password of a user in another leaked database of
an American website.
Hash value: ,3281e6de7fa3c6fd6d6c8098347aeb06bd35b0f74b96f173c7b2d28135e14d45
Salt: ,5UA[?Mw???He]SBaU
Together with the hash value and the salt, you also saw a lot of personal information associated with this
user in the database (which must be from a website for family members):
Username: laplusbelle
Name: Marie
Surname: Curie
Name of pet: Woof
Birthday: 2 January, 1980
Name of employer: UKC (University of Kent in Canterbury)
Name of mother: Jean Neoskour
Name of father: Jvaist Fairecourir
First name of husband: Eltrofor
Birthday of husband: 29 December, 1981
Because many users create passwords based on personal information (remember the YouTube video from
the "Jimmy Kimmel Live!" show?), you wonder if this user did the same. Write a program to create a
personalised dictionary and to try a personal dictionary attack to reveal the password.
Hint: Think about different ways to format dates, and how to handle white spaces.
Additional challenge: If the hash value is a different one as follows, can you still find it? This one requires
taking care of case toggling.
fc2298f491eac4cff95e7568806e088a901c904cda7dd3221f551e5b89b3c3aa
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions