2. Abstract
› How secure in the password that we use
every day?
› How hard someone guess our password?
3. Credits
› Python™ is a registered trademark of Python
Software Foundation.
› Microsoft® is a registered trademark of
Microsoft Corporation.
› Apple® and Mac® are registered trademarks
of Apple Inc.
› Raspberry Pi® is a trademark of the Raspberry
Pi Foundation.
› Linux® is a registered trademark of Linus
Torvalds.
4. Based on the following cite
› http://www.sciencebuddies.org/science-
fair-
projects/project_ideas/CompSci_p046.sht
ml
6. How to create strong
passwords
› Use totally random password generator from
an online.
› Think about passphrase which is phrase you
like or a quote from a movie. Then use the first
letter of each words and put in a number or
punctuation in there somewhere.
› Use two completely unrelated words and
separate them by numbers or characters.
› Consider pronounceable random password
Like “USiFiPiZOG”
7. Examples of Password type
› Easy to guess based on personal knowledge:
pie314
› Pronounceable random: USiFiPiZOG
› Completely random (hard to guess) :
9J8LZcWAMzjJQUnD
› Passphrase: T4IdtwiKa (Toto, 4I don't think
we're in Kansas anymore)
› Two unrelated words: deaf+anteater
› Two unrelated words + personal info:
deaf555+4715anteater
8. Refer to Bibliography to write
this presentation
› Imperva Application Defense Center. (2010). Consumer Password
Worst Practices. Retrieved January 9, 2014 from
http://www.imperva.com/download.asp?id=239
› Burnett, M. (2012, September 5). 6 New Password Rules. Xato.
Retrieved January 9, 2014 from https://xato.net/passwords/new-
password-rules
› Burnett, M. (2011, June 13). How I Collect Passwords. Xato.
Retrieved January 9, 2014 from https://xato.net/passwords/how-i-
collect-passwords
› Lucas, I. (2009, July 10). Password Recovery Speeds.
Lockdown.co.uk - The Home Computer Security Centre. Retrieved
January 9, 2014 from http://www.lockdown.co.uk/?pg=combi
› Shaffer, G. (2012). Good and Bad Passwords How-To. GeodSoft.
Retrieved January 9, 2014 from
http://geodsoft.com/howto/password/cracking_passwords.htm
9. Materials
› Computer with any type of web browser
› Lab notebook
› Pencil or pen
› Calculator
› Optional: Python software running on a
computer. We recommend Python 3, and the
example code we provide is written for
Python 3.
› Optional, but recommended: Python 3
reference book
12. Cracking method 2
› Simulate the 62-character dial. The code
start with one dial and tries all 62
possibilities. Next tries all 62^2 possibilities.
After that tries all 62^3 possibilities.