Computer Security Assessment: Password Cracking Tools

Verified

Added on  2025/06/23

|10
|797
|491
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
Computer Security
CO4509
Student Name:
Student ID:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Introduction......................................................................................................................................3
1. THC Hydra...............................................................................................................................3
Practical Implementation.............................................................................................................3
Justification..................................................................................................................................4
2. John the Ripper.........................................................................................................................4
Justification..................................................................................................................................5
3. Rainbow Crack.........................................................................................................................5
Justification..................................................................................................................................7
4. OPH Crack...............................................................................................................................7
Justification..................................................................................................................................8
Conclusion.......................................................................................................................................8
References........................................................................................................................................9
1
Document Page
Table of Figures
Figure 1: hydra location in kali as this is in built-in kali OS...........................................................3
Figure 2: hydra basic information provided when it will be opened in the terminal.......................3
Figure 3: hydra command to target password text file in the system..............................................4
Figure 4: Using wordlist to crack the user password.......................................................................4
Figure 5: John the ripper tool location in Kali Linux......................................................................4
Figure 6: John the ripper basic information when it will be opened in the terminal.......................5
Figure 7: Using John commands to crack the password of the user................................................5
Figure 8: Rainbowcrack tool location in Kali Linux.......................................................................5
Figure 9: rainbowcrack basic information when it will be opened in the terminal.........................6
Figure 10: creating rainbow tables..................................................................................................6
Figure 11: creating rainbow tables using alphanumeric characters.................................................6
Figure 12: Using tables for cracking password...............................................................................6
Figure 13: Seeing the password script that has been created...........................................................7
Figure 14: Seeing rainbowcrack file for cracked passwords...........................................................7
Figure 15: OPH crack location in kali.............................................................................................7
Figure 16: tables should be installed for password cracking...........................................................8
Figure 17: password cracked...........................................................................................................8
2
Document Page
Introduction
In this assessment, all the four password cracker tools named Hydra, OPH crack, rainbowcrack
and John the ripper will be explained with the practical implementation and proper justification
in enhancing the computer security.
1. THC Hydra
THC Hydra is a password cracker tool which is in-built in kali operating system. This tool is also
known as as a parallelized cracker. It follows many of the protocols which are used for attack
(Najera-Gutierrez & Ansari, 2018).
Practical Implementation
Figure 1: hydra location in kali as this is in built-in kali OS
Figure 2: hydra basic information provided when it will be opened in the terminal
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 3: hydra command to target password text file in the system
Figure 4: Using wordlist to crack the user password
Justification
This tool provides the functionality for cracking the passwords and also perform the fast
dictionary attack against the protocols. It also utilizes the list of passwords such as Rockyou.txt.
2. John the Ripper
It is a fast password cracking tool and very known because of its unique combining method
which is useful for every person (Halton & Weaver, 2018).
Figure 5: John the ripper tool location in Kali Linux
4
Document Page
Figure 6: John the ripper basic information when it will be opened in the terminal
Figure 7: Using John commands to crack the password of the user
Justification
This tool provides dictionary attacks, mode of single-crack and force attacks which is the
technique that feats the common flaws of the password.
3. Rainbow Crack
It uses rainbow tables for password cracking and it uses a time-memory algorithm which is
different from others (Sinha, 2018).
Figure 8: Rainbowcrack tool location in Kali Linux
5
Document Page
Figure 9: rainbowcrack basic information when it will be opened in the terminal
Figure 10: creating rainbow tables
Figure 11: creating rainbow tables using alphanumeric characters
Figure 12: Using tables for cracking password
6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 13: Seeing the password script that has been created
Figure 14: Seeing rainbowcrack file for cracked passwords
Justification
It is the computer program that generates the rainbow tables which is used for cracking the
passwords.
4. OPH Crack
This tool is built-in with kali OS but it will be useful for Windows user’s password. This tool is
based on Graphical user interface and known for that (Johansen, 2016).
Figure 15: OPH crack location in kali
7
Document Page
Figure 16: tables should be installed for password cracking
Figure 17: password cracked
Justification
This tool is open-source which used to crack the login passwords of windows with the use of LM
hashes by rainbow tables.
Conclusion
This assessment has all the explanation about the password cracking tools and their role in
computer security. All the password cracking tools are practically implemented and the results
were explained here.
8
Document Page
References
Najera-Gutierrez, G. and Ansari, J.A., 2018. Web Penetration Testing with Kali Linux: Explore
the methods and tools of ethical hacking with Kali Linux. Packt Publishing Ltd.
Halton, W. and Weaver, B., 2018. Kali Linux 2018: Windows Penetration Testing: Conduct
Network Testing, Surveillance, and Pen Testing on MS Windows Using Kali Linux 2018. Packt
Publishing Ltd.
Sinha, S., 2018. Hashes and Passwords. In Beginning Ethical Hacking with Kali Linux (pp. 323-
345). Apress, Berkeley, CA.
Johansen, G., Allen, L., Heriyanto, T. and Ali, S., 2016. Kali Linux 2–Assuring Security by
Penetration Testing. Packt Publishing Ltd.
9
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]