SlideShare a Scribd company logo
2
Most read
3
Most read
7
Most read
Cyber Security Assignment 2

Performing Password Cracking


Vibhansh Gupta


17BCS059


14 December 2020


Page of1 7
The Nature of Passwords


Passwords are the most common means of authentication. Passwords
are protected by using one-way cryptographic algorithms that produce a
hash of set length. Cryptography can only protect something to the point
where the only feasible attack on the encrypted secret is to try and guess it.
However, in the case of passwords guessing is easy. Passwords are insecure
by nature because they are used for preventing humans from guessing a
small secret created by humans.


It isn’t just web applications that are at risk from brute force attacks.
Encrypted databases, password-protected documents, and other secure
data can also be stolen in a brute force attack, whether it’s available online or
downloaded to an attacker’s computer. GPUs and cryptocurrency ASICs are
designed to handle large loads of repetitive tasks, which is exactly what a
brute force attacker needs. That doesn't mean every hacker who is
attempting a brute force attack uses one, but those who are serious about
stealing your data de
f
initely do.


Exhaustive key searches are the solution to cracking any kind of
cryptography, but they can take a very long time. When an attacker has a
high degree of con
f
idence that the password they're trying to crack consists
of certain words, phrases, or number and letter combinations, it can be much
quicker to compile a dictionary of possible combinations and use that
instead.


Page of2 7
Dictionary Attacks


Dictionaries are raw text
f
iles consisting of one word or phrase per line.
Each line is a candidate match where each hash is computed and compared
to the hashes to be recovered. The di
ff
erence between a Dictionary and a
brute-force attack is that a Dictionary contains a list of probable matches
rather than all possible string combinations. A Dictionary needs to be well
optimised otherwise if it includes any string combinations it risks becoming a
brute-force attack and loses its e
ff
iciency. Therefore Dictionaries often
include known popular passwords, words from the English and other
languages, ID numbers, phone numbers, sentences from books etc.


Many services prevent users from using simple words as their passwords
and ask to include special characters, numbers, and uppercase letters. But
even though “Password123!” technically matches these criteria, it can’t be
considered a strong password, and any dictionary attack would crack it.


The wordlists with the best success rate are the ones that are composed
from actual passwords taken from di
ff
erent public sources or previously
disclosed databases. A well-optimised wordlist can be the most successful of
all the attacks described.


Fig. 1 A simple bash script that can be used for a dictionary attack.


Page of3 7
The Attack with screenshots


Fig. 2 Old Ubuntu IRC Channel logs available online


Fig. 3 Generating the dictionary from IRC chat log
f
iles


Page of4 7


Fig. 4 Main Method for staging the attack


Page of5 7
Fig. 5 Attack ran on data from a FTP Server where ua-h000** are users


Page of6 7
Conclusion

Reviewing the output you can see I was able to determine the password
for the account in less than 4 minutes.


That’s just one of many accounts on the server. From here you could
write an automated tool to crack accounts and then implant backdoors once
an account is compromised.


While brute-force and dictionary attacks aren’t generally your go-to
options, they do have their place. Dictionary attacks, especially, can be really
powerful if used in the correct manner.


References Used


• Lecture 24: The Dictionary Attack and the Rainbow-Table Attack on
Password Protected Systems by Avi Kak - Purdue University (May 19,
2020)


• Cracking Encrypted PDF Password Using Dictionary Attack by
Shaquib Izhar - Cybrary Blog (Feb 15, 2018)


• Modern Password Cracking: A hands-on approach to creating an
optimised and versatile attack by Chrysanthou Yiannis - Royal
Holloway, University of London (May 01, 2013)
Page of7 7

More Related Content

What's hot (20)

PPTX
CISSP - Chapter 4 - Network Topology
Karthikeyan Dhayalan
 
PPTX
CISSP - Security Assessment
Karthikeyan Dhayalan
 
PDF
Broken access controls
Akansha Kesharwani
 
PPTX
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
 
PDF
Nessus Software
Megha Sahu
 
PPTX
Different types of attacks in internet
Rohan Bharadwaj
 
PPT
Chapter 2 Presentation
Amy McMullin
 
PPTX
Brute force-attack presentation
Mahmoud Ibra
 
PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
TzahiArabov
 
PPTX
SQL INJECTION
Anoop T
 
PPTX
Security vulnerability
A. Shamel
 
PDF
Cyber security training
Wilmington University
 
PDF
Customer information security awareness training
AbdalrhmanTHassan
 
PPTX
What is Ransomware
jeetendra mandal
 
PDF
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
PPTX
Security Awareness Training.pptx
MohammedYaseen638128
 
PPTX
CISSP - Chapter 1 - Security Concepts
Karthikeyan Dhayalan
 
PPTX
Network sniffers & injection tools
vishalgohel12195
 
PPTX
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
PDF
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet Filters
Gyanmanjari Institute Of Technology
 
CISSP - Chapter 4 - Network Topology
Karthikeyan Dhayalan
 
CISSP - Security Assessment
Karthikeyan Dhayalan
 
Broken access controls
Akansha Kesharwani
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
 
Nessus Software
Megha Sahu
 
Different types of attacks in internet
Rohan Bharadwaj
 
Chapter 2 Presentation
Amy McMullin
 
Brute force-attack presentation
Mahmoud Ibra
 
OWASP Top 10 2021 Presentation (Jul 2022)
TzahiArabov
 
SQL INJECTION
Anoop T
 
Security vulnerability
A. Shamel
 
Cyber security training
Wilmington University
 
Customer information security awareness training
AbdalrhmanTHassan
 
What is Ransomware
jeetendra mandal
 
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Security Awareness Training.pptx
MohammedYaseen638128
 
CISSP - Chapter 1 - Security Concepts
Karthikeyan Dhayalan
 
Network sniffers & injection tools
vishalgohel12195
 
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet Filters
Gyanmanjari Institute Of Technology
 

Similar to Password Cracking using dictionary attacks (20)

PPTX
Password cracking and brute force tools
zeus7856
 
PDF
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Fego Ogwara
 
PDF
How to choose a password that’s hard to crack
Klaus Drosch
 
PPTX
Password craking techniques
أحلام انصارى
 
PPT
Brute force
Prajwal Panchmahalkar
 
PDF
OlgerHoxha_Thesis_Final
Olger Hoxha, CISSP CISM
 
PPTX
Ethical hacking for Business or Management.pptx
FarhanaMariyam1
 
PDF
Enterprise Password Worst Practices
Imperva
 
PDF
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
IJCNCJournal
 
PPTX
Ethical hacking - Skills.pptx
Nargis Parveen
 
PDF
The strategies of password
Alimasmali3
 
PDF
Study of Directory Traversal Attack and Tools Used for Attack
ijtsrd
 
DOCX
Password Cracking
Hajer alriyami
 
PPTX
Gamifying Ethical hacking for education.pptx
yg5ptrdvbg
 
PDF
How to Secure Web Apps — A Web App Security Checklist
PixelCrayons
 
PDF
ANALYSING THE IMPACT OF PASSWORD LENGTH AND COMPLEXITY ON THE EFFECTIVENESS O...
IJNSA Journal
 
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Brian Huff
 
PPTX
Network Security
SOBXTECH
 
PDF
Password Strength Policy Query
Gloria Stoilova
 
Password cracking and brute force tools
zeus7856
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Fego Ogwara
 
How to choose a password that’s hard to crack
Klaus Drosch
 
Password craking techniques
أحلام انصارى
 
OlgerHoxha_Thesis_Final
Olger Hoxha, CISSP CISM
 
Ethical hacking for Business or Management.pptx
FarhanaMariyam1
 
Enterprise Password Worst Practices
Imperva
 
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
IJCNCJournal
 
Ethical hacking - Skills.pptx
Nargis Parveen
 
The strategies of password
Alimasmali3
 
Study of Directory Traversal Attack and Tools Used for Attack
ijtsrd
 
Password Cracking
Hajer alriyami
 
Gamifying Ethical hacking for education.pptx
yg5ptrdvbg
 
How to Secure Web Apps — A Web App Security Checklist
PixelCrayons
 
ANALYSING THE IMPACT OF PASSWORD LENGTH AND COMPLEXITY ON THE EFFECTIVENESS O...
IJNSA Journal
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Brian Huff
 
Network Security
SOBXTECH
 
Password Strength Policy Query
Gloria Stoilova
 
Ad

Recently uploaded (20)

PPTX
How to Set Up Tags in Odoo 18 - Odoo Slides
Celine George
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PPTX
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
PPTX
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
PDF
The dynastic history of the Chahmana.pdf
PrachiSontakke5
 
PPTX
Neurodivergent Friendly Schools - Slides from training session
Pooky Knightsmith
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PPT
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PPTX
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PPTX
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PPTX
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
PDF
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
PDF
Dimensions of Societal Planning in Commonism
StefanMz
 
PDF
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
PDF
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
PPTX
How to Set Maximum Difference Odoo 18 POS
Celine George
 
PPTX
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
How to Set Up Tags in Odoo 18 - Odoo Slides
Celine George
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
The dynastic history of the Chahmana.pdf
PrachiSontakke5
 
Neurodivergent Friendly Schools - Slides from training session
Pooky Knightsmith
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
Dimensions of Societal Planning in Commonism
StefanMz
 
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
How to Set Maximum Difference Odoo 18 POS
Celine George
 
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
Ad

Password Cracking using dictionary attacks

  • 1. Cyber Security Assignment 2 Performing Password Cracking Vibhansh Gupta 17BCS059 14 December 2020 Page of1 7
  • 2. The Nature of Passwords Passwords are the most common means of authentication. Passwords are protected by using one-way cryptographic algorithms that produce a hash of set length. Cryptography can only protect something to the point where the only feasible attack on the encrypted secret is to try and guess it. However, in the case of passwords guessing is easy. Passwords are insecure by nature because they are used for preventing humans from guessing a small secret created by humans. 
 It isn’t just web applications that are at risk from brute force attacks. Encrypted databases, password-protected documents, and other secure data can also be stolen in a brute force attack, whether it’s available online or downloaded to an attacker’s computer. GPUs and cryptocurrency ASICs are designed to handle large loads of repetitive tasks, which is exactly what a brute force attacker needs. That doesn't mean every hacker who is attempting a brute force attack uses one, but those who are serious about stealing your data de f initely do. Exhaustive key searches are the solution to cracking any kind of cryptography, but they can take a very long time. When an attacker has a high degree of con f idence that the password they're trying to crack consists of certain words, phrases, or number and letter combinations, it can be much quicker to compile a dictionary of possible combinations and use that instead. Page of2 7
  • 3. Dictionary Attacks Dictionaries are raw text f iles consisting of one word or phrase per line. Each line is a candidate match where each hash is computed and compared to the hashes to be recovered. The di ff erence between a Dictionary and a brute-force attack is that a Dictionary contains a list of probable matches rather than all possible string combinations. A Dictionary needs to be well optimised otherwise if it includes any string combinations it risks becoming a brute-force attack and loses its e ff iciency. Therefore Dictionaries often include known popular passwords, words from the English and other languages, ID numbers, phone numbers, sentences from books etc. Many services prevent users from using simple words as their passwords and ask to include special characters, numbers, and uppercase letters. But even though “Password123!” technically matches these criteria, it can’t be considered a strong password, and any dictionary attack would crack it. The wordlists with the best success rate are the ones that are composed from actual passwords taken from di ff erent public sources or previously disclosed databases. A well-optimised wordlist can be the most successful of all the attacks described. Fig. 1 A simple bash script that can be used for a dictionary attack. Page of3 7
  • 4. The Attack with screenshots Fig. 2 Old Ubuntu IRC Channel logs available online Fig. 3 Generating the dictionary from IRC chat log f iles Page of4 7
  • 5. 
 Fig. 4 Main Method for staging the attack Page of5 7
  • 6. Fig. 5 Attack ran on data from a FTP Server where ua-h000** are users Page of6 7
  • 7. Conclusion Reviewing the output you can see I was able to determine the password for the account in less than 4 minutes. That’s just one of many accounts on the server. From here you could write an automated tool to crack accounts and then implant backdoors once an account is compromised. While brute-force and dictionary attacks aren’t generally your go-to options, they do have their place. Dictionary attacks, especially, can be really powerful if used in the correct manner. References Used • Lecture 24: The Dictionary Attack and the Rainbow-Table Attack on Password Protected Systems by Avi Kak - Purdue University (May 19, 2020) • Cracking Encrypted PDF Password Using Dictionary Attack by Shaquib Izhar - Cybrary Blog (Feb 15, 2018) • Modern Password Cracking: A hands-on approach to creating an optimised and versatile attack by Chrysanthou Yiannis - Royal Holloway, University of London (May 01, 2013) Page of7 7