Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In this project, you are given a password file passwords.txt, the file lists a number of passwords, however, in SHA-1 hashed version. Each line of

image text in transcribed

image text in transcribed

In this project, you are given a password file "passwords.txt", the file lists a number of passwords, however, in SHA-1 hashed version. Each line of the file has the following format: [Uer ID] [SPACE] [SHA-1 Hash of The User's Password]. For example: the first two lines of the file is 1 7c4a8d09ca3762af61e59520943dc26494f8941b 2 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 First, please verify User 1's password is "123456" using this website: http://www.sha1-online.com/ Your goal in this project is to crack the passwords in the file as many as possible. You are givein the following knowledge about the (bad!) practice of people setting up their passwords: Some people tend to use only a few digits as passwords Examples: 0000, 123456, 012, 20170101, . o Some people tend to use English words or phrases or short sentences as passwords (not safel) o Examples: university, good, password, reallygood, greatday Some people combine English words and numbers, but they generally place few numbers after the English words. . Examples: university17, password123, great007 o In this project, you can safely assume that all English words are lower-case, and all of them are chosen from a given dictionary file "dictionary.tx?. You can use any computer language (Java, C/C++, Python, R, Matlab, ...) and leverage any existing open-source software, tools, or commands (e.g., sha1sum in Linux) to design the cracking system. You must detail your strategy and give the results in the report. Generally, you may need to rurn your code on a (faster?) computer for a (large?) number of days. It really depends on your cracking strategy!!! In this project, you are given a password file "passwords.txt", the file lists a number of passwords, however, in SHA-1 hashed version. Each line of the file has the following format: [Uer ID] [SPACE] [SHA-1 Hash of The User's Password]. For example: the first two lines of the file is 1 7c4a8d09ca3762af61e59520943dc26494f8941b 2 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 First, please verify User 1's password is "123456" using this website: http://www.sha1-online.com/ Your goal in this project is to crack the passwords in the file as many as possible. You are givein the following knowledge about the (bad!) practice of people setting up their passwords: Some people tend to use only a few digits as passwords Examples: 0000, 123456, 012, 20170101, . o Some people tend to use English words or phrases or short sentences as passwords (not safel) o Examples: university, good, password, reallygood, greatday Some people combine English words and numbers, but they generally place few numbers after the English words. . Examples: university17, password123, great007 o In this project, you can safely assume that all English words are lower-case, and all of them are chosen from a given dictionary file "dictionary.tx?. You can use any computer language (Java, C/C++, Python, R, Matlab, ...) and leverage any existing open-source software, tools, or commands (e.g., sha1sum in Linux) to design the cracking system. You must detail your strategy and give the results in the report. Generally, you may need to rurn your code on a (faster?) computer for a (large?) number of days. It really depends on your cracking strategy

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_step_2

Step: 3

blur-text-image_step3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Calculate the lifetime value (LTV) of a loyal customer.

Answered: 1 week ago

Question

Use service tiering to manage the customer base and build loyalty.

Answered: 1 week ago