logo

Analysis on Cyber Security 2022

   

Added on  2022-09-16

5 Pages1240 Words21 Views
Running head: Cyber Security and Analysis
Cyber Security and Analysis
Name of the Student
Name of the University
Author Note
Analysis on Cyber Security 2022_1
Cyber Security and analysis 1
1. For the task two of the tools has been used from the table those are John the Ripper and
Ophcrack. For installing the tools Virtual box has been used and the chosen OS was
Ubuntu 18.04.
2. John the ripper:
It is free password cracking tool and it is available for both windows and Linux.
However, the tool was developed initially for the Unix operating system. This is one of
the most popular password cracking tools for testing as well as for breaking programs
because the tool john the ripper is combining of number of huge number of crackers that
are included into one package. The tool has the ability to auto detect the passwords of has
type as well as it also includes a cracker that is customizable.
Ophcrack:
Ophcrack is basically a free password cracker for windows. It is based on the rainbow
tables. This is so much difficult as well as the tool is so much essential as it works on the
rainbow table that is done by the methods that are related to inventors. The tool comes
with a GUI interface as well as it can run on various platform. The features of the tool are
including:
Runs on Windows, Linux/Unix, Mac OS X.
Cracks LM and NTLM hashes.
Free tables that are available for Windows.
Brute-force module that is for the passwords that are simple.
Audit mode as well as CSV export.
3. Demonstration:
John the ripper:
Below is a sample output that is in the Debian:
“# cat pass.txt
Analysis on Cyber Security 2022_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Demonstration of penetration testing tools
|5
|1455
|19

Cyber Security and Analysis
|7
|1346
|44

Networking Project
|15
|1603
|32

Evaluation of Password Cracking Tools: John the Ripper and Rainbow Crack
|19
|2345
|42

The Ripper Utilization of Multi-Stringing
|13
|1457
|17

Cyber Security and Analysis
|10
|1318
|36