SlideShare une entreprise Scribd logo
1  sur  20
Topic
Password Cracking and Brute force
An Overview on Password Cracking
Password cracking is a term used to describe the
penetration of a network, system, or resource
with or without the use of tools to unlock a
resource that has been secured with a password
What is Password
• String of characters for authentication and log
on computer, web application , software, Files ,
network , Mobile phones, and your life 
• Comprises:
[a-zA-z, 0-9, symbols , space]
Password Characteristics
• No short length
• No birthday or phone number, real name ,
company name
• Don’t use complete words or quotes 
▫ Example:
▫ Hello123: Weak
▫ @(H311l0)@: Strong
▫ Easy to remember, hard to guess
• 1. What is Security?
▫ Protect your private data stored in the disk or transfer
between any computer or any networking device.
• 2. Why it is so important?
▫ In the information age, we will be going online more
and provide more personal information (email,
electronic transfer), and business transaction (e-
commerce).
Computer Hacker is a typically knowledgeable
person. He/she knows several different languages,
Networking protocols.
A hacker will look for internal and external
system holes or bugs to break into the system, fun
and challenging.
Attempt to break into the system by guessing or
cracking user’s passwords.
Cracker and Hacker are two different terms.
Hacker has generally higher level of education and
intelligence than cracker.
Hackers do not like crackers.
Password Security
• Don’t use your old passwords
• Don’t use working or private email for every
website registration such as games, news,….etc.
Password Cracking Concept
• guessing or recovering a password
• unauthorized access
• To recover a forgotten password
• A Penetration testing step ( e.g. Network and
Applications)
Password Cracking Concept
• Password Cracking is illegal purpose to gain
unauthorized access
• To retrieve password for
authorize access purpose
( misplacing, missing) due to
various reason.
( e.g. what was my password??)
Password Cracking Depends on
• Attacker's strengths
• Attacker's computing resources
• Attacker's knowledge
• Attacker's mode of access [physical or
online]
• Strength of the passwords
• How often you change your passwords?
• How close are the old and new
passwords?
• How long is your password?
Brute force
▫ Brute force means trying every possible
combination (e.g., a, aa, aaa to zzzzzzzzzzzzzz,
azbycx, etc.).
▫ Hybrid methods use a dictionary, but insert
special characters (e.g., %, $ # or r0ya1- Zero for o
and one for l) and/or permute words.
Password Cracking – Off Line
• Attacks:
▫ Dictionary attacks (build a dictionary of
passwords).
▫ Brute force (try all possible passwords).
• This really is still guessing – these systems
don’t break encryption!
The characteristics :-
- Need very high processing speed
- Produces many number of passwords for a
particular user using permutations and
combinations May take months years to
crack the password
Windows NT Passwords
• Length
▫ Anywhere from 0 to 14 characters
• Characters
▫ All letters (upper and lowercase), numbers, and
symbols are acceptable
• Stored in SAM database
Windows NT Security
• Local Security Authority (LSA)
▫ Determines whether a logon attempt is valid
• Security Accounts Manager (SAM)
▫ Receives user logon information and checks it
with its database to verify a correct
username/password
LM Passwords VS. NT Passwords
• An 8 character LM password is 890 times easier
to crack than an 8 character NT password
• A 14 character LM password is 450 trillion times
easier to crack than a 14 character NT Password
▫ 450 trillion = 450,000,000,000,000
NT Passwords – Not So Easy Cracking
• Character Set = Upper & lower case alpha, numeric,
specials – about 106 characters
▫ N = 807 ~ 2.26 x 1028
▫ Time = (2.26 x 1028)/(108 sec)(1/60x60x24) ~ 2.62 x 1015
days (harder)
Password cracking and brute force

Contenu connexe

Tendances

Tendances (20)

Web application security
Web application securityWeb application security
Web application security
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
User authentication
User authenticationUser authentication
User authentication
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cyber security
Cyber securityCyber security
Cyber security
 
Password Attack
Password Attack Password Attack
Password Attack
 
Web Security
Web SecurityWeb Security
Web Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
John the ripper & hydra password cracking tool
John the ripper & hydra password cracking toolJohn the ripper & hydra password cracking tool
John the ripper & hydra password cracking tool
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
Footprinting
FootprintingFootprinting
Footprinting
 

En vedette

Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentationMahmoud Ibra
 
Perform brute force
Perform brute forcePerform brute force
Perform brute forceSHC
 
Poscat seminar 3-1
Poscat seminar 3-1Poscat seminar 3-1
Poscat seminar 3-1Hyungyu Shin
 
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...OpenDNS
 
A Parallel Data Distribution Management Algorithm
A Parallel Data Distribution Management AlgorithmA Parallel Data Distribution Management Algorithm
A Parallel Data Distribution Management AlgorithmGabriele D'Angelo
 
04 brute force
04 brute force04 brute force
04 brute forceHira Gul
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)securityEnrico Zimuel
 
Clipping Algorithm In Computer Graphics
Clipping Algorithm In Computer GraphicsClipping Algorithm In Computer Graphics
Clipping Algorithm In Computer Graphicsstudent(MCA)
 
Searching algorithms
Searching algorithmsSearching algorithms
Searching algorithmsashish gupta
 
Hub 102 - Lesson 5 - Algorithm: Sorting & Searching
Hub 102 - Lesson 5 - Algorithm: Sorting & SearchingHub 102 - Lesson 5 - Algorithm: Sorting & Searching
Hub 102 - Lesson 5 - Algorithm: Sorting & SearchingTiểu Hổ
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

En vedette (20)

Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Perform brute force
Perform brute forcePerform brute force
Perform brute force
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Poscat seminar 3-1
Poscat seminar 3-1Poscat seminar 3-1
Poscat seminar 3-1
 
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
 
Brute Force Attack
Brute Force AttackBrute Force Attack
Brute Force Attack
 
A Parallel Data Distribution Management Algorithm
A Parallel Data Distribution Management AlgorithmA Parallel Data Distribution Management Algorithm
A Parallel Data Distribution Management Algorithm
 
Password Attack
Password AttackPassword Attack
Password Attack
 
04 brute force
04 brute force04 brute force
04 brute force
 
Ch04 dna mapping
Ch04 dna mappingCh04 dna mapping
Ch04 dna mapping
 
Brute Forcing
Brute ForcingBrute Forcing
Brute Forcing
 
String matching algorithms
String matching algorithmsString matching algorithms
String matching algorithms
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
Clipping Algorithm In Computer Graphics
Clipping Algorithm In Computer GraphicsClipping Algorithm In Computer Graphics
Clipping Algorithm In Computer Graphics
 
Searching algorithms
Searching algorithmsSearching algorithms
Searching algorithms
 
Hub 102 - Lesson 5 - Algorithm: Sorting & Searching
Hub 102 - Lesson 5 - Algorithm: Sorting & SearchingHub 102 - Lesson 5 - Algorithm: Sorting & Searching
Hub 102 - Lesson 5 - Algorithm: Sorting & Searching
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Spoofing
SpoofingSpoofing
Spoofing
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similaire à Password cracking and brute force

Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
Cyber Security(Password Cracking Presentation).pptx
Cyber Security(Password Cracking Presentation).pptxCyber Security(Password Cracking Presentation).pptx
Cyber Security(Password Cracking Presentation).pptxVASUOFFICIAL
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITYSupanShah2
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
Web defacement
Web defacementWeb defacement
Web defacementstudent
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Password Management
Password ManagementPassword Management
Password ManagementRick Chin
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy QueryGloria Stoilova
 
3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptxHARIKRISHNANU13
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 

Similaire à Password cracking and brute force (20)

Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Cyber Security(Password Cracking Presentation).pptx
Cyber Security(Password Cracking Presentation).pptxCyber Security(Password Cracking Presentation).pptx
Cyber Security(Password Cracking Presentation).pptx
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITY
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Time based authentication secure your system
Time based authentication secure your systemTime based authentication secure your system
Time based authentication secure your system
 
Web defacement
Web defacementWeb defacement
Web defacement
 
PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Password Management
Password ManagementPassword Management
Password Management
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy Query
 
3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Getting authentication right
Getting authentication rightGetting authentication right
Getting authentication right
 
Cryptography
CryptographyCryptography
Cryptography
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 

Plus de vishalgohel12195

Variable frequency drive and variable frequency control
Variable frequency drive and variable frequency controlVariable frequency drive and variable frequency control
Variable frequency drive and variable frequency controlvishalgohel12195
 
Self control of synchronous motor drives
Self control of synchronous motor drivesSelf control of synchronous motor drives
Self control of synchronous motor drivesvishalgohel12195
 
Owen’s bridge and measurement of increment inductance
Owen’s bridge and measurement of increment inductanceOwen’s bridge and measurement of increment inductance
Owen’s bridge and measurement of increment inductancevishalgohel12195
 
Initial and final condition for circuit
Initial and final condition for circuitInitial and final condition for circuit
Initial and final condition for circuitvishalgohel12195
 
FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS
FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS  FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS
FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS vishalgohel12195
 
Differential equations of first order
Differential equations of first orderDifferential equations of first order
Differential equations of first ordervishalgohel12195
 
Cost for production including breaking analysis
Cost for production including breaking  analysisCost for production including breaking  analysis
Cost for production including breaking analysisvishalgohel12195
 
Concept of general terms pertaining to rotating machines
Concept of general terms pertaining to rotating machinesConcept of general terms pertaining to rotating machines
Concept of general terms pertaining to rotating machinesvishalgohel12195
 
Transfer function and mathematical modeling
Transfer  function  and  mathematical  modelingTransfer  function  and  mathematical  modeling
Transfer function and mathematical modelingvishalgohel12195
 
Sag in overhead transmission line, sag calculation & string chart
Sag in overhead transmission line, sag   calculation & string chartSag in overhead transmission line, sag   calculation & string chart
Sag in overhead transmission line, sag calculation & string chartvishalgohel12195
 
Protection against overvoltage
Protection against overvoltageProtection against overvoltage
Protection against overvoltagevishalgohel12195
 
Pantograph,catenary wire,smothing reactor
Pantograph,catenary wire,smothing reactorPantograph,catenary wire,smothing reactor
Pantograph,catenary wire,smothing reactorvishalgohel12195
 
On load tap changer in a.c. locomotive transformer & air blast circuit b...
On load tap changer in a.c. locomotive transformer  & air blast circuit b...On load tap changer in a.c. locomotive transformer  & air blast circuit b...
On load tap changer in a.c. locomotive transformer & air blast circuit b...vishalgohel12195
 
Logical instruction of 8085
Logical instruction of 8085Logical instruction of 8085
Logical instruction of 8085vishalgohel12195
 
Effect of non sinusoidal waveform of a.c. machine performance
Effect of non sinusoidal waveform of a.c. machine performanceEffect of non sinusoidal waveform of a.c. machine performance
Effect of non sinusoidal waveform of a.c. machine performancevishalgohel12195
 
Disadvantages of corona, radio interference, inductive interference between p...
Disadvantages of corona, radio interference, inductive interference between p...Disadvantages of corona, radio interference, inductive interference between p...
Disadvantages of corona, radio interference, inductive interference between p...vishalgohel12195
 
Design, Planning and Layout of high voltage laboratory
Design, Planning and Layout of high voltage laboratory Design, Planning and Layout of high voltage laboratory
Design, Planning and Layout of high voltage laboratory vishalgohel12195
 

Plus de vishalgohel12195 (20)

Variable frequency drive and variable frequency control
Variable frequency drive and variable frequency controlVariable frequency drive and variable frequency control
Variable frequency drive and variable frequency control
 
Self control of synchronous motor drives
Self control of synchronous motor drivesSelf control of synchronous motor drives
Self control of synchronous motor drives
 
Owen’s bridge and measurement of increment inductance
Owen’s bridge and measurement of increment inductanceOwen’s bridge and measurement of increment inductance
Owen’s bridge and measurement of increment inductance
 
Initial and final condition for circuit
Initial and final condition for circuitInitial and final condition for circuit
Initial and final condition for circuit
 
FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS
FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS  FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS
FSK , FM DEMODULATOR & VOLTAGE REGULATOR ICS
 
Differential equations of first order
Differential equations of first orderDifferential equations of first order
Differential equations of first order
 
Cost for production including breaking analysis
Cost for production including breaking  analysisCost for production including breaking  analysis
Cost for production including breaking analysis
 
Concept of general terms pertaining to rotating machines
Concept of general terms pertaining to rotating machinesConcept of general terms pertaining to rotating machines
Concept of general terms pertaining to rotating machines
 
Transfer function and mathematical modeling
Transfer  function  and  mathematical  modelingTransfer  function  and  mathematical  modeling
Transfer function and mathematical modeling
 
armature Winding
armature Windingarmature Winding
armature Winding
 
Switching regulators
Switching regulatorsSwitching regulators
Switching regulators
 
Sag in overhead transmission line, sag calculation & string chart
Sag in overhead transmission line, sag   calculation & string chartSag in overhead transmission line, sag   calculation & string chart
Sag in overhead transmission line, sag calculation & string chart
 
Rectifier
RectifierRectifier
Rectifier
 
Protection against overvoltage
Protection against overvoltageProtection against overvoltage
Protection against overvoltage
 
Pantograph,catenary wire,smothing reactor
Pantograph,catenary wire,smothing reactorPantograph,catenary wire,smothing reactor
Pantograph,catenary wire,smothing reactor
 
On load tap changer in a.c. locomotive transformer & air blast circuit b...
On load tap changer in a.c. locomotive transformer  & air blast circuit b...On load tap changer in a.c. locomotive transformer  & air blast circuit b...
On load tap changer in a.c. locomotive transformer & air blast circuit b...
 
Logical instruction of 8085
Logical instruction of 8085Logical instruction of 8085
Logical instruction of 8085
 
Effect of non sinusoidal waveform of a.c. machine performance
Effect of non sinusoidal waveform of a.c. machine performanceEffect of non sinusoidal waveform of a.c. machine performance
Effect of non sinusoidal waveform of a.c. machine performance
 
Disadvantages of corona, radio interference, inductive interference between p...
Disadvantages of corona, radio interference, inductive interference between p...Disadvantages of corona, radio interference, inductive interference between p...
Disadvantages of corona, radio interference, inductive interference between p...
 
Design, Planning and Layout of high voltage laboratory
Design, Planning and Layout of high voltage laboratory Design, Planning and Layout of high voltage laboratory
Design, Planning and Layout of high voltage laboratory
 

Dernier

GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 

Dernier (20)

GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 

Password cracking and brute force

  • 2. An Overview on Password Cracking Password cracking is a term used to describe the penetration of a network, system, or resource with or without the use of tools to unlock a resource that has been secured with a password
  • 3. What is Password • String of characters for authentication and log on computer, web application , software, Files , network , Mobile phones, and your life  • Comprises: [a-zA-z, 0-9, symbols , space]
  • 4. Password Characteristics • No short length • No birthday or phone number, real name , company name • Don’t use complete words or quotes  ▫ Example: ▫ Hello123: Weak ▫ @(H311l0)@: Strong ▫ Easy to remember, hard to guess
  • 5. • 1. What is Security? ▫ Protect your private data stored in the disk or transfer between any computer or any networking device. • 2. Why it is so important? ▫ In the information age, we will be going online more and provide more personal information (email, electronic transfer), and business transaction (e- commerce).
  • 6. Computer Hacker is a typically knowledgeable person. He/she knows several different languages, Networking protocols. A hacker will look for internal and external system holes or bugs to break into the system, fun and challenging.
  • 7. Attempt to break into the system by guessing or cracking user’s passwords. Cracker and Hacker are two different terms. Hacker has generally higher level of education and intelligence than cracker. Hackers do not like crackers.
  • 8. Password Security • Don’t use your old passwords • Don’t use working or private email for every website registration such as games, news,….etc.
  • 9. Password Cracking Concept • guessing or recovering a password • unauthorized access • To recover a forgotten password • A Penetration testing step ( e.g. Network and Applications)
  • 10. Password Cracking Concept • Password Cracking is illegal purpose to gain unauthorized access • To retrieve password for authorize access purpose ( misplacing, missing) due to various reason. ( e.g. what was my password??)
  • 11. Password Cracking Depends on • Attacker's strengths • Attacker's computing resources • Attacker's knowledge • Attacker's mode of access [physical or online] • Strength of the passwords • How often you change your passwords? • How close are the old and new passwords? • How long is your password?
  • 12.
  • 13. Brute force ▫ Brute force means trying every possible combination (e.g., a, aa, aaa to zzzzzzzzzzzzzz, azbycx, etc.). ▫ Hybrid methods use a dictionary, but insert special characters (e.g., %, $ # or r0ya1- Zero for o and one for l) and/or permute words.
  • 14. Password Cracking – Off Line • Attacks: ▫ Dictionary attacks (build a dictionary of passwords). ▫ Brute force (try all possible passwords). • This really is still guessing – these systems don’t break encryption!
  • 15. The characteristics :- - Need very high processing speed - Produces many number of passwords for a particular user using permutations and combinations May take months years to crack the password
  • 16. Windows NT Passwords • Length ▫ Anywhere from 0 to 14 characters • Characters ▫ All letters (upper and lowercase), numbers, and symbols are acceptable • Stored in SAM database
  • 17. Windows NT Security • Local Security Authority (LSA) ▫ Determines whether a logon attempt is valid • Security Accounts Manager (SAM) ▫ Receives user logon information and checks it with its database to verify a correct username/password
  • 18. LM Passwords VS. NT Passwords • An 8 character LM password is 890 times easier to crack than an 8 character NT password • A 14 character LM password is 450 trillion times easier to crack than a 14 character NT Password ▫ 450 trillion = 450,000,000,000,000
  • 19. NT Passwords – Not So Easy Cracking • Character Set = Upper & lower case alpha, numeric, specials – about 106 characters ▫ N = 807 ~ 2.26 x 1028 ▫ Time = (2.26 x 1028)/(108 sec)(1/60x60x24) ~ 2.62 x 1015 days (harder)

Notes de l'éditeur

  1. from stored locations or from data transmission system.