Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

ISCS-3513 Information Assurance and Security Password Cracking Lab 3 100 Points For this lab you will need access to a computer that has Internet access

ISCS-3513

Information Assurance and Security

Password Cracking

Lab 3 100 Points

For this lab you will need access to a computer that has Internet access and on which you can install password cracking programs; or, you can use your virtual machine in the Computer Security Lab(CSL) where the password cracking programs are loaded. The lab is designed to acquaint you with methods used to encrypt password files and how these methods can be overcome.

I will email you some password files to cracka Windows password file and a Unix password file.

Download from the Internet at least two programs to crack the password file or use the ones in the CSL. There are a number of different programs in the public domain to do this. Pick a couple to try (you may need separate ones for the two different filesone for Windows, one for Unix).

Crack the files (note, you should be able to get all of the Windows passwords with the exception of one this will depend on the program you use.

Next find your computers password file

What is the filename?

Where is it located?

Can you copy it? Why? Why not?

Do you have any passwords that can be cracked in your password file? Why? Why not?

How can you crack the passwords in your password file?

Provide info on

The lab setup you used and your initial plan on completing the lab

A discussion about the password cracker programs you used,

The cracked passwords and a discussion as to why each individually may not have been a good password.

Answers to the questions step 4.

Here Is the code that needs to be debugged from windows:

regf[1][1]

P[1] RSTVWXYZ[`bhjklm68|} [1] 7VWX $% &/01--2?@L!A`afghijklQpqrst_m'xbhbinnk,][1]x SAMpsk` x \l[1]H [1]?[1]?[1] [1][1][1][1] [1]nk 0O[] [1]E` [1] SAMxsk xp Xd

Here Is the code that needs to be debugged from unix:

ccwhite:$1$UqsQFA4N$Gqol7EUXpZBavl3Man.mw/:12114:0:99999:7::: fred:$1$3P060KFl$ZpsfGrFZVc3Z5OwbksNhy/:12114:0:99999:7::: mary:$1$Al8hwhRX$18mo5UTAONypq2oChZgeE0:12114:0:99999:7::: user1:$1$TAXDtev7$E2LLiUmxLlQlbAdgdxuug/:12114:0:99999:7::: user2:$1$y.4kcEwM$ZPvr8Nn1p1ie7l2eswJIR/:12114:0:99999:7::: user3:$1$R.tGGg5K$nyEGPdA1i.vOErl/dR.Fd0:12114:0:99999:7::: user4:$1$SwfEuslC$3BYZQcPzL5IHmEhbTUqd0/:12114:0:99999:7::: ftrpilot:$1$wWRKPEBK$RVcO9KNG0bUZz9PgH/t0..:12114:0:99999:7:::

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

Explain the process of MBO

Answered: 1 week ago