Thursday, October 17, 2019
Password Cracker Research Paper Example | Topics and Well Written Essays - 4000 words
Password Cracker - Research Paper Example All the possible combinations of characters are tested against the encrypted passwords that are obtained in the brute-force dialog, in most of the tools that use brute force technique. We can understand this as a thief cracking a locked cupboard and trying different combinations of numbers. The key space of all possible combinations of passwords is calculated using the following formula: KS = L^(m) + L^(m+1) + L^(m+2) + ........ + L^(M) Letââ¬â¢s say that we want to crack LanManager passwords (LM) using the character set "ABCDEFGHIJKLMNOPQRSTUVWXYZ" of 26 letters. In this case, the brute-force cracker will try the above formula in this way: KS = 26^1 + 26^2 + 26^3 + ...... + 26^7 = 8353082582 8353082582 is the number of different keys that the brute force cracker tool will try. Now letââ¬â¢s suppose that we want to crack the same password but this time the character set is ââ¬Å"ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()-_+=~`[]{}|\:;"',.?/". Then, using the same formula i n this case, the number of different keys to try rises to 6823331935124. An extensive key search cracking is a very time consuming task. However, if we are using the right character set, password cracking becomes a relatively easy process. Figure 1 shows a dialogue that asks the user to either put in a character set which is predefined or put in a customized character set. The initial password can also be altered to begin a previous attack again. There is another option of ââ¬Å"key rateâ⬠that shows the number of keys that the attack attempts every second against all encrypted passwords that are loaded. ââ¬Å"Time leftâ⬠is the time remaining to complete the key space. "Current password" is the real key which is tested by the program. In the... The findings of this research will provide insight of Brute-force as one of the most powerful techniques to break plain authentications. TechTarget on the web defines brute-force technique as: ââ¬Å"Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.â⬠A brute-force attack is the process of deciphering or decrypting an encrypted text by trying each possible key. The key length of the code and the attackerââ¬â¢s computational power is very important in every brute-force attack. The major shortcoming of brute force technique is that it requires too much time to try username and password combinations. Also, brute force attacks are very noisy meaning that they generate too much of traffic along with leaving some evidence of the attack. All the possible combinations of characters are tested against the encrypted passwords that are obtained in the brute-force dialog, in most of the tools that use brute force technique. We can understand this as a thief cracking a locked cupboard and trying different combinations of numbers. Social engineering technique is the oldest method of cracking a password and is done through simple, rogue manipulation of trusting persons. The need of the hour is to spread user awareness and train the employees so that they are able to protect their networks and critical passwords.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.