logo

Cyber Security and Analysis

   

Added on  2022-12-27

7 Pages1346 Words44 Views
Running head: CYBER SECURITY AND ANALYSIS
CYBER SECURITY AND ANALYSIS
Name of the Student
Name of the University
Author Note
Cyber Security and Analysis_1
CYBER SECURITY AND ANALYSIS 1
Download and Install:
For the task two of the tools has been chosen they are Ophcrack and John the ripper,
and ubuntu has been used as the platform.
Outline:
John the ripper:
This is the main purpose is for detecting the Unix passwords that are weak. Besides
various crypt passwords, the hash type of the passwords the commonly most type that can be
found on different Linux based systems. It is supported out of the boxes are the LM hashed
that are related to the windows. In addition, lot of other ciphers as well as hashes in the
enhanced version of the community. John the ripper is basically an open source software that
is free. The tool is mainly in the form of source code.
Ophcrack:
Ophcrack is an open source program that is free. It has the ability to log in with the
passwords of the windows by using LM hashes through tables known as rainbow. The tool
consists of the capability of importing the hashes from different types of format such as
dumping from the SAM files in the OS. On most of the computers, ophcrack is having the
ability to crack most of the passwords within a minute. The rainbow tables for the LM hashes
are given for free through the developers. Ophcrack is given with the tables by default which
allows the ophcrack for cracking the passwords that are not more than 14 characters. The
ophcrack is available for free download are the four tables of windows XP and tables of
windows Vista.
Cyber Security and Analysis_2
CYBER SECURITY AND ANALYSIS 2
Demonstration:
John the ripper:
For cracking the passwords to be recovered, the clients are required to provide the
tool the required files which are needed to crack the passcodes. For cracking the passwords
some of commands are required, they are given below step by step:
Step 1: john passwd
Step 2: john --wordlist=password.lst --rules passwd
Step 3: john --show passwd
Step 4: john –restore.
Ophcrack:
The process that is followed by this tool for cracking the difficult passcode is the live
cd method. At first the tool carried out on a different computer as well as the internet
connection is needed there. After completing this step, the very next step is, the user has to
download the exact version of the live-cd that is related to the ophcrack tool. After finishing
this step, the very next step that is needed to be followed is to burn a cd with an iso file, or in
an usb drive. For this procedure one of the ISO burning tool is needed. After completing this
step, the very next step that is followed by the software is, it removes the media which is
bootable from another pc as well as that is required to be inserted into one of the machines.
At the last different account will occur with password, then the user has to find the correct
one.
Time and ease of access:
To crack or break the passcodes, the tool john the ripper takes less time than the tool
Ophcarcker. The reason behind this is, the tool, john the ripper is having more advanced
Cyber Security and Analysis_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Analysis on Cyber Security 2022
|5
|1240
|21

Installing Ophcrack and John the Ripper for Password Cracking
|11
|1289
|78

Cyber Security and Analytics
|13
|1437
|92

Cyber Security and Analysis
|10
|1318
|36

Password Cracking Tools: Cain & Abel and Ophcrack
|16
|1592
|99

Evaluation of Password Cracking Tools: John the Ripper and Rainbow Crack
|19
|2345
|42