How username and password are extracted from password file

Assignment Help Programming Languages
Reference no: EM132281368

Question: Review the bruteLogin function on p. 58 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.

You have been hired by a company to provide consultation on security and provide recommendations. Using Microsoft® Word, write a 1-page document explaining how the username and password are extracted from the password file. Describe what would happen if the script fails to open the password file.

Recommend and provide additional code that would better handle cases where the password file might not open.

Submit your assignment using the Assignment Files tab.

Linux systems keep user account information in the passwd file and the encrypted password in the shadow file.

The passwd file containing account information might look like this:

smithj:x:1001:1001:John Smith:/home/smithj:/bin/bash

The shadow file containing password and account expiration information for users might look like this:

smithj:KJDKKkkLLjjwlnttqoiybnm.:10063:0:99999:7:::

The fields in the shadow file are separated by a colon, with the first field being the username and the second the password.

Under normal circumstances, the password is encrypted but for the purpose of this assignment, you can assume the password is already unencrypted.

Review the bruteLogin function program on pp. 58 through 59 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.

Make the following changes/additions to the function:

• Modify the bruteLogin function to use both the passwd and shadow files. Assume your passwd and shadow files include two accounts.

• Change the bruteLogin to extract the username and full name from the passwd file and the password from the shadow file

• Change the output to display the full name when confirming successful FTP Login; e.g., "Myhostname FTP Logon Succeeded: John Smith/ KJDKKkkLLjjwlnttqoiybnm"

Capture screenshots of your code and output for each conversion. Paste the screenshot in a Word document.

Reference no: EM132281368

Questions Cloud

What does it mean to censor art : What does it mean to "censor" art? Who can censor? Who is able to, who is allowed to, and why? For the US, think about the Constitution: what does it say about.
What is the value of a one-month european call : What is the value of a one-month European call option with a strike price of $39?
Provide a brief overview of the lapd rampart scandal : Do you feel the Department and others failed to identify the extent of the problem and minimize its scope and nature? Explain.
What is the net cash flow from selling the machine : If the company's marginal tax rate is 35%, what is the net cash flow from selling the machine:
How username and password are extracted from password file : Review the bruteLogin function on p. 58 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration.
What is the year 4 cash flow : This equipment will have a book value of $4,500 at the end of the project, but can be sold for $5,500. The tax rare is 40 percent. What is the year 4 cash flow
What will be the new degree of operating leverage : What will be the new degree of operating leverage for 18,500 units and 16,500 units?
Calculate the amount that simeon : Calculate the amount that Simeon will have to invest today to receive R10 000 at the end of year five by using the mathematical formula.
What is the merger premium expressed : a. What is the merger premium expressed as a percent of Firm Y's stock price? What is the NPV of the acquisition if cash is used?

Reviews

Write a Review

Programming Languages Questions & Answers

  Write an application that stores 100 movies

Write an application that stores 100 movies and displays them by category.  The user can enter any of the categories to display the films in the list that match the category.

  Prepare a program that takes the data from triangle

Prepare a program that takes the data from triangle.txt (supplied in this folder) and outputs a message indicating whether the triangle is a right triangle. The text file has data for three triangles.

  Create an ordinary pipe and write the contents of the file

Design a file-copying program named filecopy using ordinary pipes. This program will be passed two parameters: the name of the file to be copied

  Create application to enter five-digit credit card number

Create an application that allows the user to enter a five-digit credit card number; assume that the fifth digit is the check digit.

  Write a program to input a purchase amount

Write a program to input a purchase amount and calculate the sales tax and total do. The SalesTax depends on the county identifying code

  Allen has been investing in the stock market for quite some

allen has been investing in the stock market for quite some time and had some success with equity investments.recently

  Create a script file that generates a row vector

Create a script file that generates a row vector of 10 random numbers from 5 to 15 - Call your function using your array of random numbers and the scalar value of 22.

  Write a program that inputs a filename from the user

Write a program that inputs a filename from the user and prints to the terminal a report of the wages paid to the employees for the given period.

  Write void function which reads game-s parameters from file

Write a void function which reads game's parameters from file. Function validates te parameters. If parameters are "bad" the function assigns default values to parameters.

  Design psuedocode program to calculate amount

Design a psuedocode program that calculates the amount of money a person would earn over a period of time if his or her salary is one penny the first day, two pennies the second day.

  Computer sales and repair store system

It is required to design a relational database system for a "realistic" application

  Write a function called stream-map

Write a function that produces a stream of positive prime numbers . Use that stream to create a list of the product of all pairs of consecutive prime numbers up to a given value.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd