How to cracking passwords without salt

Assignment Help Computer Network Security
Reference no: EM13326727

Problem 1: Cracking Passwords without Salt.  Insecuratics has just started a webmail service and has decided to store the hashes of user passwords in their database. Specifcally, when a user enters a password, it is hashed once using the SHA-1 hash function and compared to the hash value stored in the database. If the values match, the user is allowed access. No salting is used. Unfortunately, a hacker recently gained access to the database and posted some of the hashed passwords online. Use the file sha1hashes-sp13.txt containing hashes for 12 passwords. See how many you can crack. Put your answers and a detailed explanation of what you did to nd them in a textfile called prob1.txt. If you use any scripts,you must also attach those scripts. You will get 1 point for each password that you crack, with a maximum of 10 points possible. Important: you cannot just supply the passwords; you will not receive credit unless you provide explanations and any scripts you use.

Problem 2: Cracking Passwords with Salt on Linux.  Recently, an associate of yours got access to an Ubuntu Linux server. You  suspect users of this system (UST students) have a strong tendency to use the same passwords for everything (including their online banking). Thus, if you can crack their login passwords, then you can probably also steal money from their bank accounts. Because your  associate had physical access, he was easily able to obtain the /etc/shadow file. The file, renamed to shadow-sp13.txt, is available to you. Your task is to crack as many of the passwords as you can. Submit a file prob2.txt with the username, the cracked passwords, and a detailed explanation of how you found the passwords. Additionally, you should attach any scripts you used. You can use any means to find the passwords (other than copying from other students/groups). Each cracked password is worth one point, with a max of ten points possible. You will want to use the mkpasswd program and likely will want to use a bash script. Important: as in Problem 1, you need to explain how you cracked the passwords and attach any scripts you used to receive credit.

Problem 3: Timing Attacks and Password Entry. Your professor has posted (provided you with) an executable file badpass-sp13 that, when run, asks for a password. There is one correct eight character password consisting of all numbers (0 through 9). It is your job to find the password. To do this, you'll have to exploit the fact that the program is vulnerable to a timing attack. Professor Yilek is not releasing the C source code used to generate badpass, but he has revealed that the password checking routine looks something like this:

while (more characters to check)
{

if (next character of guess != next character of password)
{
break;
}
do some other stuff
}

You should submit a file prob3.txt with the password and a description of what you did to find it.

Problem 4: Bad Random Number Generation.  Instead of using bits from /dev/random or even /dev/urandom, the good people at Insecuratics have invented their own ways of generating random bit strings for use in cryptographic tools. To generate an AES key and IV to be used in aes-128-cbc, they are proposing two methods. You should break each method. You should submit a text file prob4.txt with your answers and also descriptions of the methods you used. You must also attach any bash scripts you write to solve the problem.

4.1. (Hash Process IDs.) To generate the key,

$ ps | grep "ps" | awk '{print $1,1}' | openssl dgst -sha256 -hex | head -c 32

and to generate the IV,

$ ps | grep "ps" | awk '{print $1,2}' | openssl dgst -sha256 -hex | head -c 32

Download the ciphertext prob4pidenc.txt encrypted with this method. The IV that resulted from the above was  b9a907f715e45cfe5d47b08662affa17. Your job is to find the key and the famous book the plaintext is from. You may want to read about awk, as well as Unix process IDs (PIDs). Specifically, you'll want to learn what values PIDs can take on. As stated above, put your answer and a detailed description of what you did in a file prob4.txt.

4.2. (Hash result of date command.) To generate the key,

$ date | openssl dgst -sha256 -hex | head -c 32

and then repeat immediately to generate the IV. Download the ciphertext prob4dateenc.txt encrypted with this method. The IV that resulted from the above was d0ce6f467761cabc11eae59a2f34a8a1.Your job is to find the key and the famous book the plaintext comes from. As above, put your answer and a description of your method in a file prob4.txt .

Hint: Just from the above information it should be possible to break the encryption in a reasonable amount of time. However, you can break it even faster by taking into account that for both methods Professor Yilek started up the the class Debian image and generated the key and IV soon after. It might also be useful to know that he usually works on creating assignments in the evenings on the last couple of days before posting the assignment. Also, check out the -d option of date.

Reference no: EM13326727

Questions Cloud

Summarize advantages and the disadvantages of such a group : A group meeting of stakeholders in an organization is sometimes suggested as a useful compromise between individual interviews and questionnaires to collect information from which requirements are defined for a software project.
What motivations do those online retailers provide : What motivations do those online retailers provide? Which motivating factors are most important to you? Do different factors motivate your online purchases depending on the product or service being sold?
What is the mass of the block of ice : A dockworker applies a constant horizontal force of 88.0N to a block of ice on a smooth horizontal floor. The frictional force is negligible. What is the mass of the block of ice
Find the upward lift force in terms of initial total weight : A hot-air balloon consists of a basket, one passenger, and some cargo. Let the total mass be M. Find the upward lift force in terms of the initial total weight Mg
How to cracking passwords without salt : Cracking Passwords with Salt on Linux.  Recently, an associate of yours got access to an Ubuntu Linux server. You  suspect users of this system (UST students) have a strong tendency to use the same passwords for everything (including their online..
What is necessarily required or simply artefact of history : Are they necessarily required or simply an artefact of the evolutionary history of eukaryotes. Why, for example, would eukaryotic cells require a membrane-bound nucleus when prokaryotes seem to replicate efficiently without one.
What is the maximum transverse speed of a particle : The equation of a transverse wave traveling along a very long string is y = 5.5 sin( 0.055?x + 36.0?t ), What is the maximum transverse speed of a particle in the string
What minimum power is needed to drive the moving belt : A Van de Graa? generator has a potential di?erence of 2.35 MV between the belt and the outer shell. What minimum power is needed to drive the moving belt
How far would the ball fall vertically : One of the fastest recorded pitches in major-league baseball, thrown by Tim Lincecum in 2009, how far would the ball fall vertically by the time it reached home plate, 60.5 ft away

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

  Explain cross-talk and other forms of interference

Cross-talk, and other forms of interference are a significant issue in any communications infrastructure. Compare and contrast how this problem would manifest for analog data transmitted

  Dissect an email

Dissect an email you have received. First, get the original, ASCII text of the email, including the headers, and the blank line separating the headers and the body of the email.

  Encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character "_" in its tableau as shown in class.

  Explain protocol for sending encrypted message

Consider following protocol for sending an encrypted message from Alice to Bob in presence of Key Distribution Center (KDC).

  Explain network security management-flow diagram

Network Security Management-flow diagram, assets and detail of functions. I have completed the assets and flow diagrams and interfaces. Start systems engineering on for MIIS, based on prior homework assignments:

  What is the value of shared secret key

You have secretly picked the value SA = 17. You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Anti-virus applications

Should an organization's anti-virus policy specify that anti-virus applications will be configured to quarantine infected files instead of deleting them automatically? Why or why not?

  Exchange keys out of band in symmetric encryption

In symmetric encryption, why is it significant to exchange keys "out of band"? Write down the difference between "digital signature" and "digital certificate"?

  Suggest mitigation strategies for vulnerabilities identified

Risk Management varies in each instance and event. Selecting the various options from home or work may help make or break your network.

  Write application-layer protocols use to move message

Explain how message gets from Alice's host to Bob's host. Make sure to list series of application-layer protocols which are used to move message between the two hosts.

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd