, , , , , ,

[SOLVED] Csci 180 – computer security password cracking exercise

$25

File Name: Csci_180_____computer_security_password_cracking_exercise.zip
File Size: 536.94 KB

5/5 - (1 vote)

2. Tasks Task 1: Installing John the Ripper John the Ripper is one of the most commonly used password crackers that is freely available. Do the following steps inside your VM. A: Installing on VM 1. Go to this page: Click Here 2. Go to the second section titled: Download the latest John the Ripper jumbo release 3. Choose the first one: 1.9.0-jumbo-1 sources in tar.xz, 33 MB (file name is: john-1.9.0-jumbo-1.tar.xz) 4. Click on Save file and the file will be downloaded in the Download folder. 5. Go to the Download folder and right click on the file, select Extract Here to unzip it. You will see a folder named john-1.9.0-jumbo-1. You can move this folder to any other location if you want in order to access it easier. 6. Open a terminal, change directory to where this folder is. If you have not moved it this will be the command: cd Downloads/john-1.9.0-jumbo-1/ 7. Change directory to the ‘src’ folder: cd src 8. Type: ./configure && make. This step might take about 5 to 7 minutes. B: Installing on Amazon AWS If you are using Amazon AWS use the following commands on the terminal after connecting to Amazon AWS to download and install the file: 1. sudo apt-get install libssl-dev 2. wget https://openwall.com/john/k/john-1.9.0-jumbo-1.tar.xz 3. After the file is downloaded type this command to unzip the file: tar -xf john-1.9.0-jumbo-1.tar.xz 1 CSCI 180 – Computer Security 4. Change directory to john-1.9.0-jumbo-1 folder using cd command. 5. Change directory to the ‘src’ folder: cd src 6. Type ./configure && make After the installation is done, change directory to ‘run’ folder by typing: cd ../run/ Then execute the program by typing: ./john You should be able to see the following screen. This shows that you have successfully installed the program. The list shows various options available to use while running the program. Take a look at the following documentation files: • More information about the options can be found in john-1.9.0-jumbo-1 > doc > OPTIONS. • The definition of modes such as wordlist, and incremental are described in john-1.9.0-jumbo-1 > doc > MODE. • Examples on how to use the system are shown in john-1.9.0-jumbo-1 > doc > EXAMPLES. • The john-1.9.0-jumbo-1 > doc > CONFIG file describes the configurations that you can modify. If you want to modify any of the configurations you need to change john-1.9.0-jumbo-1 > run > john.conf file. For example, if you want to emit a status line whenever a password is cracked find the following line in john.conf and change the ‘N’ to ‘Y’: CrackStatus = N. StatusShowCandidates is also useful in showing the number of password guesses tried. The result of your password cracking will be shown on the screen and will be stored in a file called john.pot. When you use multiple modes of cracking, the new results will be appended to this file. Q1: First change the CrackStatus and StatusShowCandidates configurations in john.conf file, and show a screenshot of this section of the file in your report. 2 CSCI 180 – Computer Security Task 2: Cracking a set of passwords You should have downloaded two files for this exercise. The target.txt file is a list of username and password hashes (md5) you are trying to crack. The dictionary.txt is a list of common words that you can use as a dictionary while running the password cracking attacks. Your goal in this task is to crack as many of the password hashes as possible from the target.txt file provided. You should try multiple modes with different variations. For example, you can try wordlist mode by using the command: ./john -wordlist=/dictionary.txt -format=raw-MD5 /target.txt For this exercise always use -format=raw-MD5 to identify the hash function. The wordlist is the simplest mode and will just try words from the dictionary. You can then try adding some mangling rules to each word in the dictionary by adding the option -rules to the command. -rules applies a default set of rules called Wordlist to the dictionary words. Take a look at the john-1.9.0-jumbo-1 > run > john.conf file and try to find other rule set names. Remember that the incremental mode will continue generating guesses for a very long time and may never finish, so you would want to try this option at the end, and manually stop this at some point (by pressing Ctrl-C). Q2: Start cracking the hashes in target.txt file. You should try at least 4 different modes/techniques for cracking. Out of these modes you should try at least one rule set by using -rule=. Submit the list of passwords you were able to crack with each mode, and briefly explain what this mode does and how it generates guesses. Either show the plaintext passwords with their hashes, or with the username. Show a screenshot of the command lines you used when cracking the passwords. Task 3: Find the password with the provided information Q3: Suppose you have forgotten the password you have used for a password-protected file, but you remember using the word “jackinthebox” where some of the letters were uppercase. You have also possibly replaced a with @, i with 1, e with 3 or o with 0. You have added 5 digits either to the end of it, or at the beginning. Look into John the ripper documentation and see if you can find a mode that helps you try guesses with the information given to you. Note that the mode you select must use the information provided. Just simply brute-forcing or using modes that do not take this into account is not accepted. The goal of this assignment is for you to read documentation of a software to be able to learn how the software works, as well as learning how easy it can be to do password cracking when targeting an individual with some known information on how they create their password. The MD5 hash of the password is given to you in password.txt. Try to find the password and explain the command you tried. Show screenshots.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
[SOLVED] Csci 180 – computer security password cracking exercise[SOLVED] Csci 180 – computer security password cracking exercise
$25