WK 7 Discussion

docx

School

Pierce College *

*We aren’t endorsed by this school

Course

420

Subject

Computer Science

Date

Nov 24, 2024

Type

docx

Pages

26

Uploaded by MagistrateOtter5980

Report
Name: Nylah Davis Course and Section: CBR 600 9045 Communicating, Problem Solving, and Leading in Cybersecurity (2238) Worksheet: Password Cracking 1
Introduction In the box below, please explain the purpose of password-cracking utilities and discuss their relevance to cybersecurity. Introduction This lab was to learn the process of password cracking. Password cracking is the use of an application to gain unauthorized access to systems or devices. Once inside, the individual often steals identities and uses the information to commit fraud. To successfully enter a system, an attacker may employ a dictionary attack or a brute-force attack; the former uses a wordlist to target common words, while the latter tries various password combinations consisting of letters, numbers, and symbols until the right one is revealed. In the context of cyber security, this technique may be used to assist a user in recovering a forgotten password, but when in the wrong hands and used maliciously, it could pose a threat to an organization. Similar to what happen in the Aveanna Healthcare case. 2
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Screenshot 1: Rename the Router in the Topology Yourname Rename the router in the topology map to Your First Name_Router. The name of the computer should be your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Label: Yourname_Router in the topology 4
5
Screenshot 2: Name the Cisco 1841 Router YOURNAME_Router The name of the Cisco 1841 router should also match your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Label: Ny lah Router in the prompt for the Cisco 1841 router 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7
Screenshot 3: YOURNAME Password in the Running Configuration The name of the password should match your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Label: Nylah's password in the running configuration 8
9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Screenshot 4: YOURNAME Type 7 Password Cracked The name in the password should be your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Include a screenshot of the Your name Type 7 password being cracked: Label: Nylah 7 Password cracked 10
11
Screenshot 5: Cisco Type 5 Password Cracked with Date and Time Stamp Capture the cracked Cisco type 5 MD5 password in Cain in the lower righthand corner of your screen, along with today’s date and time. Timestamps from a previous semester may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Include a screenshot of the cracked Cisco password with the date and time stamp: Label: Cisco password with the date and time stamp: The timestamp is in the right upper corner. 12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
13
Screenshot 6: Yourname User Created Take a screenshot of the yourname user being created with the net user command. Label your screenshot. Include your screenshot of Yourname user being created, using the password of green : Label: Nylah using password green 14
15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Screenshot 7: List of Users Using Net User Command Show the yourname users on the system with net user. Take a screenshot, label it, and include it here: Label: Nylah net user 16
17
Screenshot 8: Yourname and Student's Passwords Cracked Take a screenshot of the Yourname and student user's passwords that have been cracked. The name of the user listed whose passwords have been cracked should match your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Label: Nylah student user password cracked 18
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
19
Screenshot 9: Yourname in the /etc/shadow File The name of the users in the shadow file should match your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Label: Nylah Linux Shadow file 20
21
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Screenshot 10: Yourname Passwords Cracked with John the Ripper Label: John the Ripper Screenshot 22
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
23
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Conclusion In this box, please explain the purpose of this lab and explain how it is relevant to cybersecurity. Highlight what you learned while doing this lab. Hint: Discuss Cain, Group Policy Editor, character sets, John the Ripper, net user, and useradd. Conclusion In this lab we were able to use Cisco to analyze passwords on the device-Generate hash from Cisco to prepare for attacks, use Windows to analyze passwords (ran "gpedit.msc" to open the Group Policy Editor), perform the "net user" command to add users, with various passwords green and "123456789" to navigate to Cain & Kali Linux to perform and test Dictionary and Brute-Force attack. In conclusion, I found that using Cain to crack passwords was the fastest option. Using different profiles such as student1, and student2 to do a brute force attack test to determine different password results. Intricate combinations allowed the offense to be effective in roughly three to four minutes. Comparatively, the same users were used for a dictionary attempt that took less than 20 seconds to complete because it used the default wordlist. A hacker's time to steal your data can be shortened by utilizing more characters, symbols, and numbers, and refraining from terms that are often used. If I were to choose one to use I would prefer Cain over John the Ripper for faster results. Also, I believe that adding more symbols to a password could also protect against these types of occurrences. Longer passwords with words ranging from all letters of the alphabet. This could help avoid issues like this in the future. overall I believe it is good to have systems like this that help get through password when it is needed and used in the right space and context. 24
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
25
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
APA References Please list at least five references that are relevant to password cracking. Make sure to format your references in APA style. Password cracking 101: Attacks & defenses explained. BeyondTrust. (n.d.). Retrieved September16, 2022, from https://www.beyondtrust.com/blog/entry/password-cracking-101-attacks- defenses-explained Nam, S., Jeon, S., Kim, H., & Moon, J. (2020). Recurrent GANs Password Cracker For IoT Password Security Enhancement. Sensors (Basel, Switzerland), 20(11), 3106. https://doi.org/10.3390/s20113106 McMillan, R. (2016, August 8). Password Hacking Forces Big Tech Companies to Act. Wall Street Journal - Online Edition, 1. 26
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help