CO4509 Computer Security Report: Analysis of Password Cracking Tools

Verified

Added on  2023/01/03

|16
|2242
|86
Report
AI Summary
This report provides a comprehensive analysis of four prominent password cracking tools: THC Hydra, John the Ripper, RainbowCrack, and Ophcrack. It begins with an introduction to network security and password cracking, highlighting the evolution of password hacking software and the various attack methods. The report then delves into each tool, providing an overview of their functionalities, including brute force, dictionary, and hybrid attacks. It details the usage of each tool, including step-by-step instructions and screenshots to guide the reader through the process of cracking passwords. The report also covers the advantages and disadvantages of each tool, comparing their features and performance. Finally, the report concludes by justifying the selection of Ophcrack as the best tool based on its ease of use, effectiveness, and legitimate applications for password recovery, and also notes that it is a free open-source software and its liveCD technique. The assignment is a response to the CO4509 Computer Security assignment brief, requiring an investigation and short report on the specified tools, including experimentation and demonstration of understanding of their configuration, use, and utility.
Document Page
Computer Security 1
CO4509-COMPUTER SECURITY
(Student’s Name)
(Course Title)
(Tutor’s Name)
(Date)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Computer Security 2
Table of Contents
Introduction......................................................................................................................................2
Overview of THC Hydra password.............................................................................................3
How to crack passwords using THC-Hydra................................................................................4
John the ripper Password Cracking tool..........................................................................................6
How to use John Ripper...............................................................................................................7
RainbowCrack Password Cracking tool..........................................................................................9
Overview of RainbowCrack tool.................................................................................................9
Using rainbowCrack tool...........................................................................................................11
Ophcrack........................................................................................................................................13
Overview of OphCrack..............................................................................................................13
How one can use Ophcrack LiveCD..........................................................................................14
Justification of the best tool...........................................................................................................15
References......................................................................................................................................16
Document Page
Computer Security 3
Introduction
Network security can be an overwhelming; the world of network security can be
complicated. Network administrators opt to use network security tools to assists in monitoring
Information Technology (IT) environment. One of the most popular form of attack is password
cracking. Password hacking software has evolved tremendously in the current 21st century.
Password hacking software usually involves a cracker brute forcing their way into a certain
website admin panel or a login page. There are several password cracking tools. Every tool has
its own advantages and disadvantages.
Passwords are cracked using three major forms which are brute force, dictionary, and
hybrid. Dictionary form of attack uses a list of worlds when they are encrypted at a time and
then checks if hashes are equal. Hybrid is done through mutation filters. This paper will be
covering four major password cracking tools which are; THC hydra, John the ripper,
RainbowCrack, and ophCrack.
THC Hydra password cracking tool
Overview of THC Hydra password
THC Hydra is a tool used by hackers to crack passwords by enforcing both brute force
attack and dictionary type of attack. Brute force implies that the software launches a number of
passwords at a login until the correct password is achieved. Since people want to use password
that they will not forget, they tend to use words that are common in their lives like their name,
football team, and place of birth. These information is easy to fetch in the social media and so
when the hacker has analyzed this data it be compiled into a password list, which is later used by
hydra to execute brute force attack. The password list combined with the easily known
passwords, will be taken by hydra which will execute the brute force attack. With time,
Document Page
Computer Security 4
depending on the processor’s and internet’s speed, hydra will systematically execute each
password until the correct one is gotten. Incorporated in the Hydra package is the password-
inspector that reads passwords and output those that meet the requirements. If the cracking
session is successful, hydra outputs the log in name plus the password (Shema, 2014, p. 34).
The advantage of this tool is that it provides the hacker with various protocols to attack
and it is easy to add new modules to it. Hydra supports various modules like HTTP-
Proxy,Rlogin,MS-SQL,SMTP Enum, Cisco enable,Cisco auth,Cisco AAA, NNTP, PC-
Anywhere,PC-NTFS,LDAP among others. These modules make it efficient and easy to use. Also
the tool has the ability to perform what network administrators refer to as dictionary attacks
which is against over fifty protocols which includes ftp, smb, and telnet
How to crack passwords using THC-Hydra
One needs to first download the very recent version of THC hydra
Change the THC-hydra directory
Type ./configure and then make
Once installed one has a new application which is reffered to as xHyra as shown by the
screenshot below
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Computer Security 5
When one open THC hydra, one is greeted with the assistance screen as shown by the screenshot
shown below
Document Page
Computer Security 6
John the ripper Password Cracking tool
John the ripper is a tool for cracking passwords that was initially designed for UNIX
operating system but can now run in other platforms. John the ripper performs three main
function which are generating password hashes, generating passwords and doing comparison
between the hashes generated and the hashes of the passwords to be cracked. Wordlist, single
and incremental are the modes that John the reaper uses to try and crack the password. Wordlist
and single are the modes that try passwords that are assumed to most likely occur while wordlist
mode needs a list of words to be supplied when John the ripper is run and then comes up with
hashes for each of the word in the wordlist before doing a comparison of those hashes with the
hashes of the passwords to be cracked. Normally, John the ripper will first run wordlist and
Document Page
Computer Security 7
single mode before the incremental mode. The mode that needs processing power and time is the
incremental mode that come up with random passwords, creates hashes for them and then does
the comparison between those hashes and the hashes of the passwords to be cracked (Najera-
Gutierrez, 2016, p. 64).
Once the password is cracked it is printed at the terminal and saved in a file named
$JOHN/john.pot. This file is again used to not load password hashes that are already cracked the
next time you run John the ripper. If you wish to retrieve the passwords that have been cracked,
you only need to run ‘john - -show passwd’ command.
The general overview of John the Ripper is as shown by the figure shown below
How to use John Ripper
1. Get a copy of the password file else if you are using shadow passwords, use the
‘unshadow utility’.
2. Generate a hash file but first open the terminal and then navigate to the directory you
obtained your files to and while there, to the folder ‘run’.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Computer Security 8
3. Now you can brute force the hash file by running the program which is done by writing
‘./john’ which outputs as follows:
4. Add a command to execute the attack. Example:’./john ,/home/user/hash-file’ –i’ which
tries every possible password. Note that ‘-i’ represents incremental. This outputs the
following:
According to the above example, the password is ‘abcd’
Document Page
Computer Security 9
RainbowCrack Password Cracking tool
Overview of RainbowCrack tool
RainbowCrack is one of password cracking tools. It is one of the hash cracker tool which
uses a large-scale time-memory trade off process. Large-scale trade off process is employed for
faster password cracking than traditional brute force tools. In addition, time-memory trade-off is
a computational process where all hash pairs and plain text are calculated using a selected has
algorithm (Infosec, n.d).
RainbowCrack password cracker works by generating rainbow tables which are used by
password cracking. This type of tool differs from conventional brute force cracker in that the tool
uses large pre-computed tables so as to reduce the time needed for cracking password. The tool
was developed by Zhu Shuanglei but was originated in Phillippe Oechslin.
RainbowCrack tool has over ten features which are;
Support rainbow table for any charset
Runs of Linux OS
Runs of Windows OS platform
It is command line user based
It has GOU acceleration with several GPUs
Computation on multi-core processor support
Support rainbow table which are based on hash algorithm
Unified rainbow table file format which are supported operating systems
The look of rainbowCrack is as shown by the figure shown below
Document Page
Computer Security 10
Figure 1: RainbowCrack tool
As shown by the figure shown above, there is a tab for Rainbow tables. Usually this tab is
used to reduce the difficulty in brute force by cracking a single password. This tab creates a pre-
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Computer Security 11
generated data set of hashes from every possible password. Rainbow Tables takes much more
time to create than the actual cracking a single hash.
Some of rainbow table configurations is as shown by table 1 below
Table 1: LM configuration
Charset [ABCDEFGHIJKLMNOPQRSTUVWXYZ]
Success probability 0.9990
Keyspace 8353082582
Table size 610 MB
The above type of configuration has a success probability of about 99.90 percent and it only
takes about 610 MB. RainbowCrack tool has several configurations; the first command is to start
table generation using the command (Gregg, 2015, p. 45)
Rtgeb md5 loweralpha-numeric 1 7 0 3899 33554432 o
Using rainbowCrack tool
The tool that is used to generate Rainbow Tables usually comes along with RainbowCrack
download, the tool is rtgen on windows platform as shown by figure 2 shown below
Figure 2: Rainbow table generator
Document Page
Computer Security 12
Building tables
The pre-computational commands are as shown below
After running the commands the following will appear as shown
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]