Ethical Hacking-Assignment 13
docx
keyboard_arrow_up
School
Florida International University *
*We aren’t endorsed by this school
Course
4806N
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by ProfessorMetal2935
Ethical Hacking Assignment 13
Cryptography
Objective:
Using John the Ripper to crack passwords.
Video: http://nweb.eng.fiu.edu/aperezpo/EEL4806n/labs/assign13.mp4
1) Use the https://www.md5hashgenerator.com/
to generate laser MD5 hash: bf6570f6221215d285b1b54ce430e053
Use the https://crackstation.net/
to crack the previous MD5 hash and show a screenshot.
2) Access the file called hash.txt in your Kali home directory that was obtained from a Windows XP machine. Use that file to crack the password contained within it. Run John the Ripper
using john and write down the passwords that it discovered:
3) What are Rainbow Tables? Rainbow tables are precomputed tables used in cryptographic attacks, specifically against password hashes. They are designed to speed up the process of cracking passwords by storing a large number of potential plaintext passwords and their corresponding hash values.
4) Discuss and contras the difference between LM and NTLM (weakness), used on Windows, what is the hash algorithm typically used in Linux? LM (LAN Manager) and NTLM (NT LAN Manager) are authentication protocols used in Windows environments, but they differ significantly in security. LM hashes, used in older Windows versions, are highly vulnerable to password cracking due to limited password length, case insensitivity, and a restricted character set. NTLM, an improvement over LM, supports longer passwords and uses a more secure hashing algorithm, yet it remains susceptible to attacks like pass-the-hash and dictionary attacks. In Linux environments, the common hash algorithm for password storage is SHA-512
5) Compare a substitution and a transposition cyber?
Substitution ciphers replace characters, while transposition ciphers rearrange their order. Substitution ciphers are vulnerable to frequency analysis, whereas transposition ciphers are less so. Both are basic encryption methods, with polyalphabetic ciphers combining them for added security.
6) Using the Caesar Cipher C = E(4,P) = (P+4)Mod 26, what is the ciphertext for the plaintext below:
Plaintext = FIU Ciphertext = ILY
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help