How username and password are extracted from password file

Assignment Help Programming Languages
Reference no: EM132281368

Question: Review the bruteLogin function on p. 58 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.

You have been hired by a company to provide consultation on security and provide recommendations. Using Microsoft® Word, write a 1-page document explaining how the username and password are extracted from the password file. Describe what would happen if the script fails to open the password file.

Recommend and provide additional code that would better handle cases where the password file might not open.

Submit your assignment using the Assignment Files tab.

Linux systems keep user account information in the passwd file and the encrypted password in the shadow file.

The passwd file containing account information might look like this:

smithj:x:1001:1001:John Smith:/home/smithj:/bin/bash

The shadow file containing password and account expiration information for users might look like this:

smithj:KJDKKkkLLjjwlnttqoiybnm.:10063:0:99999:7:::

The fields in the shadow file are separated by a colon, with the first field being the username and the second the password.

Under normal circumstances, the password is encrypted but for the purpose of this assignment, you can assume the password is already unencrypted.

Review the bruteLogin function program on pp. 58 through 59 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.

Make the following changes/additions to the function:

• Modify the bruteLogin function to use both the passwd and shadow files. Assume your passwd and shadow files include two accounts.

• Change the bruteLogin to extract the username and full name from the passwd file and the password from the shadow file

• Change the output to display the full name when confirming successful FTP Login; e.g., "Myhostname FTP Logon Succeeded: John Smith/ KJDKKkkLLjjwlnttqoiybnm"

Capture screenshots of your code and output for each conversion. Paste the screenshot in a Word document.

Reference no: EM132281368

Questions Cloud

What does it mean to censor art : What does it mean to "censor" art? Who can censor? Who is able to, who is allowed to, and why? For the US, think about the Constitution: what does it say about.
What is the value of a one-month european call : What is the value of a one-month European call option with a strike price of $39?
Provide a brief overview of the lapd rampart scandal : Do you feel the Department and others failed to identify the extent of the problem and minimize its scope and nature? Explain.
What is the net cash flow from selling the machine : If the company's marginal tax rate is 35%, what is the net cash flow from selling the machine:
How username and password are extracted from password file : Review the bruteLogin function on p. 58 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration.
What is the year 4 cash flow : This equipment will have a book value of $4,500 at the end of the project, but can be sold for $5,500. The tax rare is 40 percent. What is the year 4 cash flow
What will be the new degree of operating leverage : What will be the new degree of operating leverage for 18,500 units and 16,500 units?
Calculate the amount that simeon : Calculate the amount that Simeon will have to invest today to receive R10 000 at the end of year five by using the mathematical formula.
What is the merger premium expressed : a. What is the merger premium expressed as a percent of Firm Y's stock price? What is the NPV of the acquisition if cash is used?

Reviews

Write a Review

Programming Languages Questions & Answers

  Write unix shell script to check file in current directory

Write Unix shell script (one program) called Project1_lastname (your lastname). This script will do the following tasks: Using "if" statement checks for a file called "student.txt" in current directory.

  Write a program to allow user to create a binary search tree

Write a program to allow user to create a binary search tree. Your program should display in BFT and DFT (in order) format.

  Write and run the program using MARIE simulator

Write a MARIE program to calculate Fib(n), where the user inputs n. You need to write and run the program using MARIE simulator

  Design your own simple class to represent any household item

Design and implement your own simple class to represent any household item of your choice (toaster, fan, hair dryer, piano ...) Your class should have a constructor, one additional method and at least one member variable.

  Do you believe that html may have outlived its usefulness

HTML was the original Web page protocol, developed for hypertext documents on the emerging Web. Many different protocols and technologies have since been developed.

  Write a program that reads and processes data

Write a program that reads and processes data about quarterly rainfall for one year. Your program should ask the user to enter rain fall amounts for each of the four quarters in the year.

  Design a menu allow administrator to simulate transmission

Prepare a menu which allow administrator to simulate the transmission of information by manually typing in the login or logoff data. Whenever someone log in or out, the display should be updated.

  Write program that asks user for initial

Write a program that asks a user for his/her first initial. Then ask the user to type 1,2 3, 4. When the user types 4 the program ends. When the user types in 1, 2, or 3 , the program displays the message.

  Simmac language programs

Write three programs in the machine language of the SIMMAC that will total the numbers stored in 20 different locations and place the result in a single location.

  Define back-end and front-end applications.

Define procedures (subroutines) and functions and the difference between them.

  Program takes input from a user in the form of a phrase

This program takes input from a user in the form of a phrase. It then converts the phrase to ig latin.

  What is the height of the retinal image

Create a binary image at least 64x64 in dimensions. Using Octave's existing functions, perform Average, Gaussian and Laplacian filters on the image. Display the original image and each of the filtered images in Octave plots. Discuss and compare your..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd