Ces slides présentent en générale quelques méthodes utilisées pour le craquage de mots de passe sur internet, en particulier l'étude des outils de craquage avec les Rainbow Tables,
Share and Enjoy !
The document discusses different RAID levels for storing data across multiple disks. It provides details on RAID levels 0 through 6, including the minimum number of drives required, how data and parity are distributed, and example diagrams. The benefits of RAID include preventing data loss from disk failures through techniques like mirroring, striping, and parity.
Blu-ray Disc is a format for optical discs used to store high-definition video and large amounts of data. It was developed as an improvement over traditional DVDs, offering over 5 times the storage capacity through the use of blue laser technology. A standard Blu-ray Disc can hold 25GB of data on a single layer or 50GB on a dual layer disc. The Blu-ray Disc format was established in 2002 by a group of leading technology companies and supports playback of high-definition video without loss of quality.
RAID (redundant array of independent disks) manages multiple disk drives as one unit for improved performance and fault tolerance. The document discusses various RAID levels and their characteristics, including advantages and disadvantages for different applications. RAID 0 provides no fault tolerance but high performance, while RAID 1 offers full data mirroring for fault tolerance. RAID 5 uses parity for redundancy with good performance. Higher RAID levels like RAID 10 and RAID 50 provide both redundancy and performance through combinations of striping and mirroring.
Cryptographie: Science mathématique permettant d’effectuer des opérations sur un texte intelligible afin d’assurer une ou plusieurs propriétés de la sécurité de l’information .
The document discusses different RAID levels for storing data across multiple disks. It provides details on RAID levels 0 through 6, including the minimum number of drives required, how data and parity are distributed, and example diagrams. The benefits of RAID include preventing data loss from disk failures through techniques like mirroring, striping, and parity.
Blu-ray Disc is a format for optical discs used to store high-definition video and large amounts of data. It was developed as an improvement over traditional DVDs, offering over 5 times the storage capacity through the use of blue laser technology. A standard Blu-ray Disc can hold 25GB of data on a single layer or 50GB on a dual layer disc. The Blu-ray Disc format was established in 2002 by a group of leading technology companies and supports playback of high-definition video without loss of quality.
RAID (redundant array of independent disks) manages multiple disk drives as one unit for improved performance and fault tolerance. The document discusses various RAID levels and their characteristics, including advantages and disadvantages for different applications. RAID 0 provides no fault tolerance but high performance, while RAID 1 offers full data mirroring for fault tolerance. RAID 5 uses parity for redundancy with good performance. Higher RAID levels like RAID 10 and RAID 50 provide both redundancy and performance through combinations of striping and mirroring.
Cryptographie: Science mathématique permettant d’effectuer des opérations sur un texte intelligible afin d’assurer une ou plusieurs propriétés de la sécurité de l’information .
The document provides a history of graphics technology, beginning with Intel's first video graphics controller board in 1983. It discusses several important graphics cards throughout the years, including the Commodore Amiga (1985), Nvidia GeForce 3 (programmable shading), and ATI Radeon 9700. Modern graphics cards consist of a printed circuit board containing a GPU, video memory, RAMDAC, and output ports. Integrated graphics use system memory while dedicated cards have independent video memory for improved performance.
Ce cours de Réseaux Informatiques est présenté en mode diaporama, il est préparé et dédié aux étudiants en 1er cycle spécialité informatique et Réseaux et pour ceux qui s’intéressent à la configuration et installation des réseaux informatiques.
This document outlines the course outcomes and topics to be covered for a Cloud Computing elective course. The course aims to describe system models, analyze virtualization mechanisms, demonstrate cloud architectural design and security, and construct cloud-based software applications. The topics covered in Unit 1 include scalable computing over the internet, technologies for network-based systems, system models for distributed and cloud computing, software environments, and performance, security and energy efficiency. Specific topics in Unit 1 range from multicore CPUs and virtualization to models like clusters, grids, peer-to-peer networks and cloud computing.
This document provides an overview of different RAID levels from 0 to 6. It describes the key characteristics of each level including minimum drive requirements, data protection mechanisms, performance advantages and disadvantages, and recommended applications. RAID levels range from striped arrays without parity (RAID 0) to more advanced techniques with dual parity protection (RAID 6). The document contains diagrams and explanations of how each RAID level works to provide varying balances of performance, capacity, and fault tolerance.
Pour accéder aux fichiers nécessaires pour faire ce TP, visitez: https://drive.google.com/folderview?id=0Bz7DokLRQvx7M2JWZEt1VHdwSE0&usp=sharing
Pour plus de contenu, Visitez http://liliasfaxi.wix.com/liliasfaxi !
Computer memory can be classified as primary or secondary memory. Primary memory, also called main memory, is located directly on the motherboard and includes RAM and ROM. RAM is used for temporary storage and needs power to retain data, while ROM permanently stores basic startup instructions. Secondary memory, used for long-term storage, includes magnetic tapes, disks, and optical disks like CDs and DVDs, which allow large amounts of data to be stored externally to the computer's main components. Common units for measuring computer memory are bits, bytes, kilobytes, megabytes, gigabytes, and terabytes.
This document compares hard disk drives (HDDs) and solid state drives (SSDs), outlining their key advantages and disadvantages. SSDs have much faster access times than HDDs, are more reliable due to having no moving parts, use less power, and generate less noise and heat. However, SSDs are more expensive per gigabyte and have less storage capacity than HDDs. The document recommends using an SSD for the operating system and important programs and an HDD for storage of other files.
A multiple choice problem consists of a set of color classes P = {C1 , C2 , . . . , Cn }. Each color class Ci consists of a pair of objects typically a pair of points. Objective of such a problem, is to select one object from each color class such that certain optimality criteria is satisfied. One example of such problem is rainbow minmax gap problem(RMGP). In RMGP, given P, the objective is to select exactly one point from each color class, such that the maximum distance between a pair of consecutive selected points is minimized. This problem was studied by Consuegra and Narasimhan. We show that the problem is NP-hard. For our proof we also describe an auxiliary result on satisfiability. A 3-SAT formula is an LSAT formula if each clause (viewed as a set of literals) intersects at most one other clause, and, moreover, if two clauses intersect, then they have exactly one literal in common. We show that the problem of deciding whether an LSAT formula is satisfiable or not is NP-complete. We also briefly describe some approximation results of some multiple choice problems.
This document describes the Rainbow storage technology which uses colored geometric shapes and dots printed on paper or plastic sheets to store digital data at very high densities. It can store files like text, images, audio and video clips in this "rainbow format". A specially developed scanner then decodes this back into the original digital formats. Key points:
1. It uses colors and shapes instead of binary 1s and 0s to store data on paper up to 2.7GB per square inch.
2. A scanner along with specialized software is used to read these prints and decode the data back into its original form.
3. The technology achieves much higher storage capacities than conventional printing by encoding data in a
The document provides a history of graphics technology, beginning with Intel's first video graphics controller board in 1983. It discusses several important graphics cards throughout the years, including the Commodore Amiga (1985), Nvidia GeForce 3 (programmable shading), and ATI Radeon 9700. Modern graphics cards consist of a printed circuit board containing a GPU, video memory, RAMDAC, and output ports. Integrated graphics use system memory while dedicated cards have independent video memory for improved performance.
Ce cours de Réseaux Informatiques est présenté en mode diaporama, il est préparé et dédié aux étudiants en 1er cycle spécialité informatique et Réseaux et pour ceux qui s’intéressent à la configuration et installation des réseaux informatiques.
This document outlines the course outcomes and topics to be covered for a Cloud Computing elective course. The course aims to describe system models, analyze virtualization mechanisms, demonstrate cloud architectural design and security, and construct cloud-based software applications. The topics covered in Unit 1 include scalable computing over the internet, technologies for network-based systems, system models for distributed and cloud computing, software environments, and performance, security and energy efficiency. Specific topics in Unit 1 range from multicore CPUs and virtualization to models like clusters, grids, peer-to-peer networks and cloud computing.
This document provides an overview of different RAID levels from 0 to 6. It describes the key characteristics of each level including minimum drive requirements, data protection mechanisms, performance advantages and disadvantages, and recommended applications. RAID levels range from striped arrays without parity (RAID 0) to more advanced techniques with dual parity protection (RAID 6). The document contains diagrams and explanations of how each RAID level works to provide varying balances of performance, capacity, and fault tolerance.
Pour accéder aux fichiers nécessaires pour faire ce TP, visitez: https://drive.google.com/folderview?id=0Bz7DokLRQvx7M2JWZEt1VHdwSE0&usp=sharing
Pour plus de contenu, Visitez http://liliasfaxi.wix.com/liliasfaxi !
Computer memory can be classified as primary or secondary memory. Primary memory, also called main memory, is located directly on the motherboard and includes RAM and ROM. RAM is used for temporary storage and needs power to retain data, while ROM permanently stores basic startup instructions. Secondary memory, used for long-term storage, includes magnetic tapes, disks, and optical disks like CDs and DVDs, which allow large amounts of data to be stored externally to the computer's main components. Common units for measuring computer memory are bits, bytes, kilobytes, megabytes, gigabytes, and terabytes.
This document compares hard disk drives (HDDs) and solid state drives (SSDs), outlining their key advantages and disadvantages. SSDs have much faster access times than HDDs, are more reliable due to having no moving parts, use less power, and generate less noise and heat. However, SSDs are more expensive per gigabyte and have less storage capacity than HDDs. The document recommends using an SSD for the operating system and important programs and an HDD for storage of other files.
A multiple choice problem consists of a set of color classes P = {C1 , C2 , . . . , Cn }. Each color class Ci consists of a pair of objects typically a pair of points. Objective of such a problem, is to select one object from each color class such that certain optimality criteria is satisfied. One example of such problem is rainbow minmax gap problem(RMGP). In RMGP, given P, the objective is to select exactly one point from each color class, such that the maximum distance between a pair of consecutive selected points is minimized. This problem was studied by Consuegra and Narasimhan. We show that the problem is NP-hard. For our proof we also describe an auxiliary result on satisfiability. A 3-SAT formula is an LSAT formula if each clause (viewed as a set of literals) intersects at most one other clause, and, moreover, if two clauses intersect, then they have exactly one literal in common. We show that the problem of deciding whether an LSAT formula is satisfiable or not is NP-complete. We also briefly describe some approximation results of some multiple choice problems.
This document describes the Rainbow storage technology which uses colored geometric shapes and dots printed on paper or plastic sheets to store digital data at very high densities. It can store files like text, images, audio and video clips in this "rainbow format". A specially developed scanner then decodes this back into the original digital formats. Key points:
1. It uses colors and shapes instead of binary 1s and 0s to store data on paper up to 2.7GB per square inch.
2. A scanner along with specialized software is used to read these prints and decode the data back into its original form.
3. The technology achieves much higher storage capacities than conventional printing by encoding data in a
Angad Kumar Singh submitted a report on Rainbow Technology to partially fulfill the requirements for the IT681 seminar course. The report describes a new technology called Rainbow Storage that can store up to 450GB of digital data on a single sheet of paper by encoding the data in geometric shapes and color combinations. The encoded "Rainbow format" data can be printed on paper or plastic at high density and then scanned back into a digital format using specialized software and hardware. This breakthrough enables vastly more data to be stored much more cheaply and sustainably on paper than conventional storage media like CDs and DVDs.
Rainbow Storage is a group of techniques to store digital data in some colours, colour combinations and symbols in Rainbow Format. The technique is used to achieve high-density storage. With the help of Rainbow system we would be watching full-length high definition videos from a piece of paper! The main attraction is the cheap paper. The Rainbow technology is feasible because printed text, readable by the human eye does not make optimal use of the potential capacity of paper to store data. By printing the data encoded in a denser way much higher capacities can be achieved
Rainbow Storage is a group of techniques to store digital data in some colors, color combinations and symbols in Rainbow Format. The technique is used to achieve high-density storage.
The document describes a proposed new data storage technology called "Rainbow Technology" that claims to be able to store up to 450 GB of data on an ordinary sheet of paper. It would represent data using colored geometric shapes rather than binary and could store around 2.7 GB per square inch when printed at high resolution. However, experts are skeptical because the claimed storage densities would require unprecedented compression or capabilities beyond current printing and scanning technologies. If proven, Rainbow Technology could provide an extremely low-cost and environmentally friendly alternative to DVDs and hard drives.
1. ´Etude des outils de craquage de mots de passe par
Rainbow Tables
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi
Telecom PariTech
Universit´e de Pierre et Marie Curie
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 1/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
2. Plan de la pr´esentation
1 Introduction
2 M´ecanismes usuels de protections de mots de passe
3 John The Ripper
4 Hashcat
5 Les Rainbow Tables
6 Les outils de test
7 M´ecanismes de contre mesures face aux Rainbow Tables
8 Conclusion
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 2/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
3. Motivation & Objectifs
Motivations :
Apprendre `a nous prot´eger contre diff´erentes type d’attaques.
Savoir pourquoi mˆeme les institutions les plus s´ecuris´ees et
prot´eg´ees se font hack´es.
Objectifs :
´Etudier les types d’attaques pour le craquage de mots de passe.
Maˆıtriser divers outils de craquage
´Etudier les m´ecanismes utilis´es pour assurer la s´ecurit´e des
mots de passe.
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 3/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
4. Introduction
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 4/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
5. M´ecanismes usuels de protection de mots de passe
1. Robustesse des mots de passe
Pas trop court.
Pas tr`es simple.
Pas le mˆeme partout.
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 5/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
6. M´ecanismes usuels de protection de mots de passe
2. Stockage des mots de passe
En claire :
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 6/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
7. M´ecanismes usuels de protection de mots de passe
2. Stockage des mots de passe
Hach´e :
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 7/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
8. Deux listes de travail
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 8/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
9. John the ripper
JTR un des plus performants software disponible.
Mode incremental, dictionnaire et single
Filtres de JTR
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 9/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
10. John The ripper : atouts
Auto-d´etection des formats de hash
optimisation du calcul (GPU-CPU)
calcul distribu´e
version graphique
Flexibilit´e
session de travail
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 10/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
11. Hashcat
Hashcat est l’outil le plus avanc´e pour la recovery des mots de
passe.
Il existe deux versions de hashcat un bas´e sur le CPU et
l’autre bas´e sur GPU nomm´e OCLHashcat.
Publi´e autant qu’open source sous la licence MIT.
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 11/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
12. Modes d’attaque
Brute Force attack.
Combinator attack
Hybrid attack
Mask attack
Rule-Based attack
Toggle-Case attack
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 12/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
13. Mot de passe r´ecup´er´e par dictionnaire
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 13/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
14. Mot de passe r´ecup´er´e par Force brute
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 14/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
15. Mot de passe r´ecup´er´e par Hashcat
Un dictionnaire issue de l’attaque par masque et force brute
Un dictionnaire issue de l’attaque par dictionnaire et
combinatoire (Crackstation)
Le dictionnaire final contient 4.900.000 mots craquant environ
84.86% des mots de passe pr´esent dans le hashdump qu’on a
r´ecup´er´e.
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 15/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
16. R´esultat Final
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 16/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
17. Les Rainbow Tables
M´ethode de craquage de mots de passe.
Propos´e par Philippe Oechslin en 2003.
Une structure de donn´ees contenant des textes claires.
Elle ajoute un compromis entre temps et m´emoire.
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 17/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
18. Principe de fonctionement
Deux principes g´en´eraux.
1 G´en´eration de la table.
2 Recherche du mot de passe dans la table.
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 18/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
19. G´en´eration de la table
Cette ´etape consiste `a cr´eer une rainbow table `a partir de mots
al´eatoirement g´en´er´es en d´ebut de chaˆıne en leurs appliquant des
fonctions pour obtenir `a la fin une table qui contient plusieurs
textes claires
Commencer par un mot en d´ebut de chaˆıne.
Appliquer des fonctions de hachage et de r´eduction.
Sauvegarder uniquement les mots en d´ebut et en fin de la
chaˆıne.
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 19/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
20. G´en´eration de la table
Les fonctions de r´eduction
Qu’est ce qu’une fonction de r´eduction ?
L’inverse d’une fonctions de hachage.
C’est est une fonction qui g´en`ere un texte clair `a partir d’une
empreinte : empreinte -> texte clair.
Attention : Elle ne permet pas de retrouver le texte clair d’un
hache.
Utiliser plusieurs fonctions diff´erentes pour la g´en´eration de la
table pour ´eviter le prbl`eme de colision.
Exemple d’application :
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 20/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
21. G´en´eration de la table
Exemple d’application :
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 21/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
22. G´en´eration de la table
Exemple de g´en´eration d’une table
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 22/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
23. Rechercche du mot de passe
A partir d’une empreinte p on veux trouver le texte claire
correspondant.
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 23/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
24. Outils de test
Pr´erequis
1
2 Processeur : Intel Core i7-5500U CPU @2.40GHz x 4
3 RAM : 8Go
4 Carte graphique : GeForce 840M
5 Syst`eme : Ubuntu
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 24/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
25. Outils de test
Outils de test
1 Rainbowcrack
2 Ophcrack
3 Rcracki mt
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 25/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
26. Rainbowcrack
Outil pour cracker les hash des mots de passe
Utilisation des Rainbows Tables
Bas´e sur la technique de compromis temps-memoire
Avantage : r´eduction de temps de craquage d’un mot de passe
Utilise trois (03) programmes :
1 rtgen
2 rtsort
3 rcrack
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 26/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
27. Rainbowcrack
G´en´erer les rainbow tables
# rtgen hash algorithm charset plaintext len min
plaintext len max table index chain len chain num
part index
1 hash algorithm : md5, MD2, MD4, SHA1, ...
2 charset : le type de caract`eres
3 plaintext len min : nombre minimum de caract`eres que le texte
clair peut contenir
4 plaintext len max : nombre maximum de caract`eres que le
texte clair peut contenir
5 table index : le num´ero de la table.
6 chain len : la longueur de chaque chaine dans la table
7 chain num : le nombre de chaines dans la rainbow table
8 part index : le titre du fichier de la table
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 27/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
28. Ophcrack
Logiciel libre
Craquage des mots de passe des utilisateurs de syst`emes
d’exploitation Windows stock´es en LM hash (LAN Manager
hash) et en NTLM hash
Les rainbow tables sont disponible gratuitement
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 28/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
29. Rcracki mt
Une version modifi´e de rcrack
Nouvelles type de tables : hybrides et index´ees
Utilisation du multi threading
Avantage : acc´el´erer le temps de craquage du mot de passe
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 29/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
30. Avantages & Inconv´enients
Avantages :
Plus de chance de retrouver le mot de passe par rapport `a une
attaque par dictionnaire.
Compromis entre temps et m´emoire.
Inconv´enients :
Peu efficace par rapport `a l’attaque par force brute.
N’assure pas de retrouver le mot de passe s’il n’a pas ´et´e
g´en´er´e dans la table.
Lenteur si les tables sont trop volumineuses.
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 30/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
31. M´ecanismes de contre-mesures face aux attaques par
Rainbow Tables
Ajout du Salt
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 31/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
32. M´ecanismes de contre-mesures face aux attaques par
Rainbow Tables
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 32/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
33. M´ecanismes de contre-mesures face aux attaques par
Rainbow Tables
Choix du mot de passe
Longueur du mot de passe doit ˆetre sup´erieur `a 12 caract`ere.
3 Caract`ere sp´eciaux, 3 majuscule, 3 minuscule.
Eviter les paterns usuel Majiscule6miniscule4chiffre.
Utiliser un mot de passe unique pour chaque plat-form,
facebook, twitter..etc
Utiliser un password manager (exemple: 1Password).
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 33/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
34. M´ecanismes de contre-mesures face aux attaques par
Rainbow Tables
Choix du mot de passe
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 34/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
35. Benchmark
Comparatif entre les diff´erentes attaques :
M´ethodes
d’attaque Efficacit´e Rapidit´e Ressources M´emoire
Force brute +++ + +++ +
Dictionnaire ++ ++ +++ +++
Rainbow
table ++ ++ +++ ++
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 35/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
36. Exemple
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 36/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
37. Conclusion
Au terme de ce projet :
Nous avons ´etudier diff´erentes types et techniques d’attaques.
Maˆıtriser plusieurs outils de craquage de mots de passe.
Apprendre une nouvelle technique de cassage de mot de passe
: Rainbow table.
Ce projet nous a incit´e a ˆetre plus vigilant en ce qui concerne
la s´ecurit´e de notre identit´e.
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 37/38
´Etude des outils de craquage de mots de passe par Rainbow Tables
38. Merci de votre attention !
Questions ?
M. Antitene, M. Kaced, N. Hadji, K. Aidli, B. Bettuzzi 38/38
´Etude des outils de craquage de mots de passe par Rainbow Tables