Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Hashes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

Hashes :

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

Dictunary :

password 123456 12345678 abc123 querty monkey letmein dragon 111111 baseball iloveyou trustno1 1234567 sunshine master 123123 welcome shadow ashley footbal jesus michael ninja NOVIKOVA novikov996 novik2009 novigator noviembre6 novieann novie2 novicov novichok noveno novembro november86 november82 november75 november4 november199 november1963 november16 November12 november11 november0 Novembe1 mustang password1 bungus bumrush bumpc77 bump6931 bumm bumface bumerbumer bumbumbu bumbl bumbarash bumba bumaga bulverde bululu bullys bullrush Bullock bullmkt bullhorn bullets1 bullet11 bulla bull777 bull56 bull13 bull12 bull01

image text in transcribed

General Guidelines A project group can consist of at most 5 individuals. Option 1 Implement a password cracker in your preferred programming language Source code must be well documented (comments). You will be provided with an unsalted hashed password file that contains password hashes for different users. Also, you will be provided with a dictionary file(in clear text) containing the most common passwords. You should implement the offline dictionary attack by trying SHA1 and SHA2 algorithms. Also, your program should brute force all possible alphanumeric(only small cases) passwords from 1 to 4 characters using SHA1 and SHA2 algorithms against all hashed passwords left from the offline dictionary attack (if any). Option 2 Write a report that discusses a recent attack, vulnerability, flaws, weak points on any system or protocol, i.e., OS, web, database, e-commerce, payment protocol, identification device, etc. Also, you are responsible for presenting your report in 10 minutes using the MS Power Point (Minimum number of slides are 10, Maximum number of slides 15). The report has to be at least five pages and written in your own words. Your report must offer solutions, remedies, fixes, etc

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Explain the use of the employment interview.

Answered: 1 week ago

Question

fscanf retums a special value EOF that stands for...

Answered: 1 week ago