Need help lab activity 3.13.1 lab activity lab: extracting passwords (files and lists) Downloadable files input1pass.txt and input1 shadow.txt Main.py Zybook

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
100%

Need help lab activity 3.13.1 lab activity lab: extracting passwords (files and lists)

Downloadable files input1pass.txt and input1 shadow.txt

Main.py

Zybook

 

19
3
Home
Reference & Gitation Generator
Content
zy Section 3.13- CYB/135: Object-C X
learn.zybooks.com/zybook/CYB_135_55317605/chapter/3/section/13
E zyBooks My library> CYB/135: Object-Oriented Security Scripting home > 3.13: LAB: Extracting Passwords (files and lists)
O a日
E zyBooks catalog Help/FAQ 8 Ricky Ortiz
3.13 LAB: Extracting Passwords (files and lists)
The Linux operating system is a very popular server OS. A network administrator has to protect the login/password files stored on the
servers. In Linux there are two important files:
/etc/passwd
And it contains rows that look like this:
root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/ sbin:/sbin/nologin
adm:x:3:4: adm:/var/adm:/sbin/nologin
ftp:x:14:50: FTP User:/var/ftp:/sbin/nologin
userl:x:15:51:User One:/home/userl:nologin
user2:x:15:51:User One:/home/userl:nologin
user3:x:15:51:User One:/home/userl:nologin
This file contains login information. It's a list of the server's accounts that has userlD, grouplD, home directory, shell and more info.
And the second file /etc/shadow, contains rows that look like this:
root:$1$TDQFedzXS.kv51AjM.FInu0lrHldY30:15045:0:99999:7:::
bin:*:14195:0:99999:7:::
daemon::14195:0:99999:7:::
adm: :14195:0:99999:7:::
ftp::14195:0:99999:7:::
userl:51S 3STPXDZXS.kv51AjM.FInu0lrHldY30:15045:0:99999:
:::
userl:44#=STDQFedzX$.Pxp39484.FInu0lrHldY30:15045:0:99999:7:::
userl:TXlsifhQMinXX@.YUlppxp0177:15045:0:99999:7:::
CCO
26
7.
4.
P.
K
B.
W N
Transcribed Image Text:19 3 Home Reference & Gitation Generator Content zy Section 3.13- CYB/135: Object-C X learn.zybooks.com/zybook/CYB_135_55317605/chapter/3/section/13 E zyBooks My library> CYB/135: Object-Oriented Security Scripting home > 3.13: LAB: Extracting Passwords (files and lists) O a日 E zyBooks catalog Help/FAQ 8 Ricky Ortiz 3.13 LAB: Extracting Passwords (files and lists) The Linux operating system is a very popular server OS. A network administrator has to protect the login/password files stored on the servers. In Linux there are two important files: /etc/passwd And it contains rows that look like this: root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/ sbin:/sbin/nologin adm:x:3:4: adm:/var/adm:/sbin/nologin ftp:x:14:50: FTP User:/var/ftp:/sbin/nologin userl:x:15:51:User One:/home/userl:nologin user2:x:15:51:User One:/home/userl:nologin user3:x:15:51:User One:/home/userl:nologin This file contains login information. It's a list of the server's accounts that has userlD, grouplD, home directory, shell and more info. And the second file /etc/shadow, contains rows that look like this: root:$1$TDQFedzXS.kv51AjM.FInu0lrHldY30:15045:0:99999:7::: bin:*:14195:0:99999:7::: daemon::14195:0:99999:7::: adm: :14195:0:99999:7::: ftp::14195:0:99999:7::: userl:51S 3STPXDZXS.kv51AjM.FInu0lrHldY30:15045:0:99999: ::: userl:44#=STDQFedzX$.Pxp39484.FInu0lrHldY30:15045:0:99999:7::: userl:TXlsifhQMinXX@.YUlppxp0177:15045:0:99999:7::: CCO 26 7. 4. P. K B. W N
EL/uonpas/
= zyBooks My library> CYB/135: Object-Oriented Security Scripting home > 3.13: LAB: Extracting Passwords (files and lists)
zyBooks catalog @ Help/FAQ 8 Rich
Brute Force Attempt:
Login: user2
Password: LL928393X
Uasuccessful brute force attempt
Brute Force Attept:
Login: use:3
Password: &^334294kksri.
Uasuccessful brute force attempt
Brute Force Atte pt:
Login: demol23
Password: password
Successful brute force attempt
Notes:
There is a newline at the end of the output
• inputipass.txt is available to download.
input1shadow.txt is available to download
• Hint' - check out the Python zip () for mapping the login in one file to the other
3B0698 1995764
OL/O
3.13.1: LAB: Extracting Passwords (files and lists)
Downloadable fles
inputlshadow.txt
pun
Download
inputipass.txt
main.py
()
0B.
W N
Transcribed Image Text:EL/uonpas/ = zyBooks My library> CYB/135: Object-Oriented Security Scripting home > 3.13: LAB: Extracting Passwords (files and lists) zyBooks catalog @ Help/FAQ 8 Rich Brute Force Attempt: Login: user2 Password: LL928393X Uasuccessful brute force attempt Brute Force Attept: Login: use:3 Password: &^334294kksri. Uasuccessful brute force attempt Brute Force Atte pt: Login: demol23 Password: password Successful brute force attempt Notes: There is a newline at the end of the output • inputipass.txt is available to download. input1shadow.txt is available to download • Hint' - check out the Python zip () for mapping the login in one file to the other 3B0698 1995764 OL/O 3.13.1: LAB: Extracting Passwords (files and lists) Downloadable fles inputlshadow.txt pun Download inputipass.txt main.py () 0B. W N
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Windows
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education