Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Write a program that performs the brute-force attack to break the password. The following table shows encrypted passwords using the crypt() function. Your mission is

Write a program that performs the brute-force attack to break the password. The following table shows encrypted passwords using the crypt() function. Your mission is to break the password corresponding your CWID in the table. For example, the last digit of your CWID is 1, then you should identify the password for indBOW06MoVz6.

Last digit of CWID

Encrypted password

1

indBOW06MoVz6

2

in79RsnfG/VWo

3

inbqJM0dLgWvo

4

incT1ji3YqQ/Y

5

in7haMV00ylgk

6

in1U0tb9WpIcI

7

inPlXS.yNKivQ

8

inqidvfWapJp2

9

injY7hdQJTeu2

0

inQW.HgtuEe.M

Crypt() is a function to check UNIX/LINUX passwords, and the encrypted passwords above are encoded by the standard crypt() function. Hence, you should use the crypt() function to break the password. The crypt() function takes two input parameters and returns the encrypted password, as follows:

Input parameters:

  • Password (plaintext): string
  • Salt: string

Output:

  • Encrypted password: string

The password length is six and the salt is set to infosec (without using the quotation mark). For the brute-force attack, you should try from aaaaaa, aaaaab, aaaaac, , to zzzzzz, with the salt. Report the original plaintext password by breaking the encrypted password (one based on your CWID). Also report how many words you tested to find the original password.

It is recommended to write a program using either Python or C/C++. While there are numerous resources for referencing crypt(), the following shows just two of them (but you can refer to any other helpful resources).

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Understanding Oracle APEX 5 Application Development

Authors: Edward Sciore

2nd Edition

1484209893, 9781484209899

More Books

Students also viewed these Databases questions

Question

Myrna Talefiero is this organizations president elect.

Answered: 1 week ago

Question

How many owner operators are in the industry?

Answered: 1 week ago