Ethical Hacking and Penetration Testing : Presentation

Verified

Added on  2022/08/12

|10
|689
|39
Presentation
AI Summary
As the Lead Security Analyst in your organization, you have been asked by the Chief Security Officer to prepare a presentation to introduce concepts, skills, and tools used by hackers to compromise systems. You should include information about the following: What is a hash, and how does it play a role with passwords? What are the locations of passwords in each of the following: UNIX/Linux Windows Mac OSX What are the methods or permissions needed to view the passwords for all three operating systems? Describe the process of password cracking, and include a discussion about the following attacks: Dictionary Brute force Rainbow tables Describe at least 3 tools used for password cracking; include at least 1 for Windows and 1 for UNIX/Linux. note- PowerPoint presentation: 8–10 slides
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
ETHICAL HACKING AND
PENETRATION TESTING
Name of Student:
Name of University:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTRODUCTION
The presentation deals with the ethical
hacking and penetration testing. As the
lead security analyst, the chief security
officer of the company has asked to
introduce the concepts about the tools
and the skills used by the hackers to
hack as system. The presentation
consists of the concepts about the tools
and skills required for hacking.
Document Page
HASH
It is also known as message digest
Number produced from string of text
Used to make sure that the transmitted
messages are not transferred
The hash is used for password hashing
Converts passwords into unreadable
strings
Hashes are not designed to be
decrypted
Document Page
LOCATION OF
PASSWORDS
Passwords in UNIX is stored
in/etc/passwd but moved to
/etc/shadow.
The passwords are hashed and salted
The passwords in windows are stored in
C:\windows\system 32\SAM
The passwords in Mac OSX is stored in
the keychain Access app
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
METHODS TO VIEW
PASSWORDS
The passwords in windows can be can
be viewed from the credential manager
in the manage password options
The passwords in the Linux operating
system can be viewed from the package
“shadow-utils”.
The passwords can be found saved in
the safari browser
Document Page
PROCESS OF PASSWORD
CRACKING
formulation of an estimate about the
password
Encrypting the speculated password
utilizing the similar algorithm as the
system being attacked
Comparison of the hashed guess against
the real value of hashed that was
captured
Document Page
TYPES OF ATTACKS
Dictionary attack: Technique of
breaking into a server or a computer
that is protected by passwords by
entering words of dictionary
Brute force: Method to get access to a
site by trying different combinations of
passwords and usernames
Rainbow tables: it is a precomputed
table that is used in order to reverse the
functions of hash.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
TOOLS OF PASSWORD
CRACKING
There are various tools those are used in
password cracking. These include
Brutus: It is a password cracker used for
windows. It works online and try to
break telnet or IMAP.
Rainbow Crack: It is a tool that produces
rainbow tables to be used in cracking of
passwords.
John the ripper: It is a UNIX tool that is
used for cracking of password.
Document Page
BIBLIOGRAPHY
Yisa, V., Baba, M., & Olaniyi, E. (2016, November). A review of top open source password
cracking tools. In Proc. of the International Conference on Information and Communication
Technology and its Applications (ICTA).
Seide, F. (2017, February). Keynote: The computer science behind the microsoft cognitive
toolkit: an open source large-scale deep learning toolkit for Windows and Linux. In 2017
IEEE/ACM International Symposium on Code Generation and Optimization (CGO) (pp. xi-xi).
IEEE.
Devi, K. K., & Arumugam, S. (2019, April). Password Cracking Algorithm using Probabilistic
Conjunctive Grammar. In 2019 IEEE International Conference on Intelligent Techniques in
Control, Optimization and Signal Processing (INCOS) (pp. 1-4). IEEE.
Liu, E., Nakanishi, A., Golla, M., Cash, D., & Ur, B. (2019, May). Reasoning Analytically About
Password-Cracking Software. In 2019 IEEE Symposium on Security and Privacy (SP) (pp. 380-
397). IEEE.
Yaswinski, M. R., Chowdhury, M. M., & Jochen, M. (2019, May). Linux Security: A Survey. In 2019
IEEE International Conference on Electro Information Technology (EIT) (pp. 357-362). IEEE.
Valois, M., Lacharme, P., & Le Bars, J. M. (2019, June). Performance of Password Guessing
Enumerators Under Cracking Conditions. In IFIP International Conference on ICT Systems
Security and Privacy Protection (pp. 67-80). Springer, Cham.
Document Page
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]