Lab 6a – PW Cracking

docx

School

Renton Technical College *

*We aren’t endorsed by this school

Course

436

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

17

Uploaded by MagistratePencil8798

Report
Lab 6a – PW Cracking Exercise 1 Step 1: Attempt to crack hash.txt
Z
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
2 nd attempt to crack both hash + word. Results only show for the word.txt file. Step 2: Went on http://www.miraclesalad.com/webtools/md5.php and generated the following MD5 hashes: SeahawksFan2006 5272659f91761b9864d1f2924e6185bb BringTheSonicsBack2024 67ddb16b7e748c2dddc62dcd8c97176a MarinersNeedaChampionship2024 3f26b459660d8e7bb120918c3ced03c4
Using the hash identifier within Kali Linux’s applications, the first hash was inputted and the results came as the following:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Next step was to modify the hast.txt and word.txt files and add my own user-created passwords. The same MD5 hash was used for both, but for the weaker passwords, “dog” and “cat” were used.
A test is run and shows that there are 9 passwords for the word.txt file, which would be incorrect, as there are 10. Under Candidates.#1, it shows a word.txt password, as well as the hash.txt file, which shows the user-generated MD5 hash.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
A second test is run, using a different invocation (#hashcat –a3 –m0 –-outfile=cracked.txt hash.txt word.txt) rather than (#hashcat –a0 –m0 –-outfile=cracked.txt hash.txt word.txt). This time, more passwords were cracked.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
A third attempt was run, using the invocation #hashcat –a 0 –m 0 –-force –outfile=cracked.txt hash.txt word.txt. The correct number of passwords for the word.txt was stated in the dictionary cache but did
not show any of the cracked passwords. Whereas, with the hash.txt, both a pre-inputted password, as well my weak user-created password was cracked. Exercise 2 Step 1: New users and passwords were added. A temporary directory was added and the password information was moved and copied via shadow.
Step 2: Invoked John at 2050. After 30 minutes, 2 passwords were cracked. Of the 3 passwords created, 2 were cracked. Step 3: Attempts to delete the user profiles were unsuccessful. Through the invocation cat /etc/passwd, it shows that the three users do exist. However, when invoking the userdel command, it shows that the users do not exist.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Attempted to search for the users using “grep” but there were no outputs. Unsure how to proceed. +Step 4: Removed the passwd and shadow copies. Invoking the john –show combined.txt command still shows the added users. Still unable to delete them. Time: 2133 Exercise 3 Step 1: Took longer than 3 minutes. Step 2: Created a list of MD5 hashes.
The 1 st attempt to crack the file using John the Ripper was unsuccessful. 2 nd attempt to crack the file using hashcat was successful. Shows all 4 passwords.