logo

Networking - Password Cracking docx.

   

Added on  2022-08-13

8 Pages1271 Words56 Views
Running head: NETWORKING
NETWORKING
Name of the Student:
Name of the University:
Author Note

1
NETWORKING
Step 1: Create 3 (three) users on a system of your choice
A virtual box has been used for creating three users in the systems. The name of the users
has been selected as User1, User2 and User3. All the users in the system have been assigned a
password and the passwords have been cracked here with the help of the tool known as John the
Ripper.
Password Cracking is referred to the means of discovering the passwords installed in a
computer without actually knowing it. It is done by obtaining the data file of the passwords
contained in the computer system and the cracking done by the guessing the passwords and rhe
using an algorithm in a repetitive iteration which would be using a number of combinations and
permutation to check with the password and discover them successfully. There are several
reasons for which password cracking can be done and there can also be malicious reason for
which password cracking is done. This might result in cybercrime. Hence, it is important that the
process should be performed with authentic intentions in mind. This can also occur when a
person has misplaced a password and a non-malicious password would be taking place in a
system. An example of this can be found when an admin checks the system and reveals some of
the passwords which are of less strength and hence can be revealed easily.
This is also done in checking the security of the systems and the nodes found vulnerable
have their passwords reset to a strong one.

2
NETWORKING
Step 2: Each user must have a password based on any of the following rules.
use different rules for different users.
Short (8 characters) dictionary word
The first user has been created with useradd command. The name of the user is User1 and
the password set for the user is: password.
Short (8 characters) random sequence of letters (mixed case)
The command useradd has been used here for the creation of the user. The name of the
user is User1 and the password set for the user is: PassWord.
Short (8 characters) random sequence of letters (mixed case) and digits

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Installing Ophcrack and John the Ripper for Password Cracking
|11
|1289
|78

Assignment about MCTC School of Technology Security Labs.
|18
|2938
|23

Cyber Security and Analysis
|7
|1346
|44

Analysis on Cyber Security 2022
|5
|1240
|21

Server Administration: Linux and Server
|10
|1096
|123