SlideShare a Scribd company logo
1 of 15
Download to read offline
How Easily Can
Your Password
Be Hacked?
s1240190 Yuto Shoji
Abstract
› How secure in the password that we use
every day?
› How hard someone guess our password?
Credits
› Python™ is a registered trademark of Python
Software Foundation.
› Microsoft® is a registered trademark of
Microsoft Corporation.
› Apple® and Mac® are registered trademarks
of Apple Inc.
› Raspberry Pi® is a trademark of the Raspberry
Pi Foundation.
› Linux® is a registered trademark of Linus
Torvalds.
Based on the following cite
› http://www.sciencebuddies.org/science-
fair-
projects/project_ideas/CompSci_p046.sht
ml
Introduction
› Strong computer passwords are important
to protect our information on computer
system.
How to create strong
passwords
› Use totally random password generator from
an online.
› Think about passphrase which is phrase you
like or a quote from a movie. Then use the first
letter of each words and put in a number or
punctuation in there somewhere.
› Use two completely unrelated words and
separate them by numbers or characters.
› Consider pronounceable random password
Like “USiFiPiZOG”
Examples of Password type
› Easy to guess based on personal knowledge:
pie314
› Pronounceable random: USiFiPiZOG
› Completely random (hard to guess) :
9J8LZcWAMzjJQUnD
› Passphrase: T4IdtwiKa (Toto, 4I don't think
we're in Kansas anymore)
› Two unrelated words: deaf+anteater
› Two unrelated words + personal info:
deaf555+4715anteater
Refer to Bibliography to write
this presentation
› Imperva Application Defense Center. (2010). Consumer Password
Worst Practices. Retrieved January 9, 2014 from
http://www.imperva.com/download.asp?id=239
› Burnett, M. (2012, September 5). 6 New Password Rules. Xato.
Retrieved January 9, 2014 from https://xato.net/passwords/new-
password-rules
› Burnett, M. (2011, June 13). How I Collect Passwords. Xato.
Retrieved January 9, 2014 from https://xato.net/passwords/how-i-
collect-passwords
› Lucas, I. (2009, July 10). Password Recovery Speeds.
Lockdown.co.uk - The Home Computer Security Centre. Retrieved
January 9, 2014 from http://www.lockdown.co.uk/?pg=combi
› Shaffer, G. (2012). Good and Bad Passwords How-To. GeodSoft.
Retrieved January 9, 2014 from
http://geodsoft.com/howto/password/cracking_passwords.htm
Materials
› Computer with any type of web browser
› Lab notebook
› Pencil or pen
› Calculator
› Optional: Python software running on a
computer. We recommend Python 3, and the
example code we provide is written for
Python 3.
› Optional, but recommended: Python 3
reference book
Cracking a Password
› We consider how to crack about cash
box lock has three dials.
Cracking method 1
› Count from 0 to 999 and try all patterns to
unlock.
Cracking method 2
› Simulate the 62-character dial. The code
start with one dial and tries all 62
possibilities. Next tries all 62^2 possibilities.
After that tries all 62^3 possibilities.
Cracking method 3
› Simulate a list of passwords that people
often use.
Cracking method 4
› Simulate the combination of words and
other characters. Then use a number or
punctuation in between two words.
Finally
› Consider about passwords is very
important for our secure life.

More Related Content

Similar to English presentation for English class

UKSG - Just Do IT Yourself
UKSG  - Just Do IT YourselfUKSG  - Just Do IT Yourself
UKSG - Just Do IT Yourself
Tony Hirst
 
Engineering culture
Engineering cultureEngineering culture
Engineering culture
Pamela Fox
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
Steve Sokoloski
 
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Seattle Interactive Conference
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
STO STRATEGY
 

Similar to English presentation for English class (20)

Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1
 
Every Business Needs a Chatbot
Every Business Needs a ChatbotEvery Business Needs a Chatbot
Every Business Needs a Chatbot
 
Internet Safety & Security
Internet Safety & Security Internet Safety & Security
Internet Safety & Security
 
Hello Coding anyone can learn coding now.pdf
Hello Coding anyone can learn coding now.pdfHello Coding anyone can learn coding now.pdf
Hello Coding anyone can learn coding now.pdf
 
Converging Big Data and Application Infrastructure by Steven Poutsy
Converging Big Data and Application Infrastructure by Steven PoutsyConverging Big Data and Application Infrastructure by Steven Poutsy
Converging Big Data and Application Infrastructure by Steven Poutsy
 
Mind Grill
Mind GrillMind Grill
Mind Grill
 
UKSG - Just Do IT Yourself
UKSG  - Just Do IT YourselfUKSG  - Just Do IT Yourself
UKSG - Just Do IT Yourself
 
Passwords, Passwords and more Passwords
Passwords, Passwords and more PasswordsPasswords, Passwords and more Passwords
Passwords, Passwords and more Passwords
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Passwords & security
Passwords & securityPasswords & security
Passwords & security
 
Engineering culture
Engineering cultureEngineering culture
Engineering culture
 
Python basics
Python basicsPython basics
Python basics
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
 
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
 
Creating Chatbots Using TensorFlow | Chatbot Tutorial | Deep Learning Trainin...
Creating Chatbots Using TensorFlow | Chatbot Tutorial | Deep Learning Trainin...Creating Chatbots Using TensorFlow | Chatbot Tutorial | Deep Learning Trainin...
Creating Chatbots Using TensorFlow | Chatbot Tutorial | Deep Learning Trainin...
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Ux scot voice usability testing with woz - ar and sf - june 2019
Ux scot   voice usability testing with woz - ar and sf  - june 2019Ux scot   voice usability testing with woz - ar and sf  - june 2019
Ux scot voice usability testing with woz - ar and sf - june 2019
 
NLTK - Natural Language Processing in Python
NLTK - Natural Language Processing in PythonNLTK - Natural Language Processing in Python
NLTK - Natural Language Processing in Python
 
Intro to web 2.0 Security
Intro to web 2.0 SecurityIntro to web 2.0 Security
Intro to web 2.0 Security
 

Recently uploaded

Recently uploaded (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 

English presentation for English class

  • 1. How Easily Can Your Password Be Hacked? s1240190 Yuto Shoji
  • 2. Abstract › How secure in the password that we use every day? › How hard someone guess our password?
  • 3. Credits › Python™ is a registered trademark of Python Software Foundation. › Microsoft® is a registered trademark of Microsoft Corporation. › Apple® and Mac® are registered trademarks of Apple Inc. › Raspberry Pi® is a trademark of the Raspberry Pi Foundation. › Linux® is a registered trademark of Linus Torvalds.
  • 4. Based on the following cite › http://www.sciencebuddies.org/science- fair- projects/project_ideas/CompSci_p046.sht ml
  • 5. Introduction › Strong computer passwords are important to protect our information on computer system.
  • 6. How to create strong passwords › Use totally random password generator from an online. › Think about passphrase which is phrase you like or a quote from a movie. Then use the first letter of each words and put in a number or punctuation in there somewhere. › Use two completely unrelated words and separate them by numbers or characters. › Consider pronounceable random password Like “USiFiPiZOG”
  • 7. Examples of Password type › Easy to guess based on personal knowledge: pie314 › Pronounceable random: USiFiPiZOG › Completely random (hard to guess) : 9J8LZcWAMzjJQUnD › Passphrase: T4IdtwiKa (Toto, 4I don't think we're in Kansas anymore) › Two unrelated words: deaf+anteater › Two unrelated words + personal info: deaf555+4715anteater
  • 8. Refer to Bibliography to write this presentation › Imperva Application Defense Center. (2010). Consumer Password Worst Practices. Retrieved January 9, 2014 from http://www.imperva.com/download.asp?id=239 › Burnett, M. (2012, September 5). 6 New Password Rules. Xato. Retrieved January 9, 2014 from https://xato.net/passwords/new- password-rules › Burnett, M. (2011, June 13). How I Collect Passwords. Xato. Retrieved January 9, 2014 from https://xato.net/passwords/how-i- collect-passwords › Lucas, I. (2009, July 10). Password Recovery Speeds. Lockdown.co.uk - The Home Computer Security Centre. Retrieved January 9, 2014 from http://www.lockdown.co.uk/?pg=combi › Shaffer, G. (2012). Good and Bad Passwords How-To. GeodSoft. Retrieved January 9, 2014 from http://geodsoft.com/howto/password/cracking_passwords.htm
  • 9. Materials › Computer with any type of web browser › Lab notebook › Pencil or pen › Calculator › Optional: Python software running on a computer. We recommend Python 3, and the example code we provide is written for Python 3. › Optional, but recommended: Python 3 reference book
  • 10. Cracking a Password › We consider how to crack about cash box lock has three dials.
  • 11. Cracking method 1 › Count from 0 to 999 and try all patterns to unlock.
  • 12. Cracking method 2 › Simulate the 62-character dial. The code start with one dial and tries all 62 possibilities. Next tries all 62^2 possibilities. After that tries all 62^3 possibilities.
  • 13. Cracking method 3 › Simulate a list of passwords that people often use.
  • 14. Cracking method 4 › Simulate the combination of words and other characters. Then use a number or punctuation in between two words.
  • 15. Finally › Consider about passwords is very important for our secure life.