How to evaluate a hash

Assignment Help Computer Networking
Reference no: EM131220230

Password Challenge

Objective

The objective of this lab is to put your password hash cracking and text decoding skills to the test. This lab uses various encoding and hashing algorithms that you'll need to figure out.

It is a progressive lab, so the farther down the list the harder the passwords will be to crack. I'd venture to guess that some may even be unbreakable, but just like real life you can expect to run into hashes that cannot be cracked.

I'm asking you to try to get them all, but don't be disappointed if you are unable to.

The idea here it to get you thinking about how to evaluate a hash (or encoded text) and figure out the best tools and methods to crack (or decode) the hashes or encoded text into a string or the plaintext version of the password.

Materials

For the purposes of this lab, you will need the following:
- Time and patients and Google and some luck...just like EC01
- The list of encoded or hashed (or both) passwords below
- A large wordlist, perhaps a GPU, and john the ripper, oclhashcat, or any other hash cracking, text decoding tools you see fit to complete this mission

The Setup
We have been handed a file that contains a bunch of encoded text or hashed passwords and we need get these back into a readable plain text format. Some answers are text strings and others are the passwords that we will need to complete our investigation into an on-going matter at our client. To get credit you need to decipher the items in the list below. Note that each piece of encoded text or hashed password has a "level" next to each one. The level is indicative of the difficulty of the encoding or hash and more difficult decryption are worth more extra credit points. You're also free to use any tools at your disposal and are not limited to the tools we discuss in class or that are in the labs.

Unfortunately, the guy who pulled these from the systems under investigation won the PowerBall and quit. When he left he "air-dropped" a microphone and screamed "Seacrest, out!" We tried to stop him and ask for his notes on the case but he said something about an appointment to buy an island, walked off, and that's the last we heard from him.

Oh, and one more thing, in the event you need it, the user account name for each hash is "depaul" (not in quotes obviously). Also, the salt, unless you can see it in the hash itself, is "hello" (also, obviously not in quotes). Not every hash needs this information, but that's part of your job, to figure this out...

Here's the list:

Q1. (Level 0) - Gsrh lmv rh vzhb, z hrnkov zgyzhs vmxlwv. Gsv mvcg lmv'h zm vmxlwv zh dvoo, xzm blf urtfiv rg lfg?

Q2. (Level 1) - Sio ain cn, yums, lcabn? Hyrn ihy cm uh yhwixy um qyff - nbyh ih ni nby bulxyl koymncihm

Q3. (Level 1) - ZW5vdWdoIGVuY29kaW5nIGFmdGVyIHRoaXMsIG9uIHRvIGhhc2hlcy4gIHlvdSBhcmUgZ2 9pbmcgdG8gbmVlZCBhIGRlY2VudCB3b3JkbGlzdCBhbmQgc29tZSBwb3dlciB0byBnZXQg YWxsIG9mIHRoZSBoYXNoZXMuICBDb25zaWRlciB0aGFuIEkgdXNlZCBOVExNLCBkb21 haW4gY2FjaGVkLCBNRDUodW5peCksIHNoYTI1NmNyeXB0LCBhbmQgc2hhNTEyY3J5c HQgdG8gY3JlYXRlIHRoZSBoYXNoZXMsIHBsdXMgc29tZSBvdGhlciBmb3JtYXRzIHRoY XQgeW91J2xsIG5lZWQgdG8gZmlndXJlIG91dCBhdCB0aGUgZW5k

Q4. (Level 1) - 7a21990fcd3d759941e45c490f143d5f

Q5. (Level 2) - f4e61f523ae3dc73f55cf3227b5e7138

Q6. (Level 1) - $1$1toVu3pw$KasX5rAcEgyU6J3kvFdaM.

Q7. (Level 1) - $5$helloooo$2skkWHNtJoatQzUeigpO6h52zJ4BsGxzBJ0pHhrBPH5

Q8. (Level 2) - $5$helloooo$emr2mn7KebTBsRGoVZMJ53GYN2Yz./We5WkR.Yb9rb.

Q9. (Level 2) - $1$AMGdQZMu$oUpv70n6pzECtBWgkzOCv1

Q10. (Level 1) -
$6$helloooo$T2CRgIHDBgTpWARClHDcfAg1I9llipJfnvyKgjxd1pe5Nb8wVkE9BuWxChaJjg Sz3M3aeqMfdSGQAnTaibOE0/

Q12. (Level 2) -
$6$helloooo$02OtvcXrDaGblWygaXbMuZl7WNMv7SovNrxLxvZpFiu.w1puUuVXWQkpazY EoDCksDpKxTIuV1O96jHC.jdFH1

Q13. (Level 3) - $1$i9Xvdk.J$itPsQ3Aw/tSytR1guqSiC1

Q14. (Level 3) - $P$BROjlbx4FlCrENsKm8B9LKooWoepD21

Q15. (Level 3) - 11f4e97a0609eb99

Q16. (Level 4) - JDEkTHgxTDNKRWwkb0NwMTI4T01PZ1plSVVDVWxhTFo4MQ==

Q17. (Level 4) - c513158d4340c9fd6f85886ffabd4d42edb56a9f3770fdc0107ee5e51433a3d61692d0cdadc15e200 b6a9ef9279d0a2da780fb6d69553fb0ed0a541b88a19b15

Q18. (Level 5) - 1314009918a24a28466e84e31c3b8827

Q19. (Level 5) - 50 52 49 97 101 102 51 51 100 53 49 48 97 53 49 101 57 57 102 49 57 56 99
98 97 48 48 49 99 49 99 54

What you need to turn in

- A list of the hash/encoded text, the plaintext version of the text or password, the type of hash, and the method in which you cracked/deciphered it (i.e. john the ripper using the rockyou.txt wordlist). For the password hashes I'd also be interested, although not required, how long it took to crack the hash. If you're supplying that last piece of info you may need to tell me something about the system you were using, such as CPU/cores or GPU model. This information would probably be best in a spreadsheet of some kind, with columns of question number, original hash/encoded text, decoded hash/text, method, notes/additional info, etc.

- You will get credit for the items you complete, so it would be in your best interest to complete as much as possible and turn this in. Credit will be given based on the difficulty and number of these you complete.

Attachment:- NetworkMiner.rar

Reference no: EM131220230

Questions Cloud

Opportunity cost of going to disneyland : You visit the Disneyland from time to time. What is the opportunity cost of going to Disneyland? How about the benefit? Think about ways to measure your benefit of going to Disneyland.
Are these difficulties true for all types of scatter plots : How many independent variables can be depicted in a scatter plot? What are some of the difficulties in visualizing data in a scatter plot? Are these difficulties true for all types of scatter plots? Suggest alternatives for overcoming these limita..
Will concern necessarily translate into effective leadership : Should criminal justice managers be concerned with the personal aspects of employees' lives? Will this concern necessarily translate into effective leadership in that organization?
Describe oscar budget constraints : 0scar consumes two goods, wine and cheese. His weekly income is $500. a. Describe Oscar's budget constraints under the fol- lowing conditions 1.
How to evaluate a hash : We have been handed a file that contains a bunch of encoded text or hashed passwords and we need get these back into a readable plain text format. Some answers are text strings and others are the passwords that we will need to complete our investi..
Give examples of at least three different types of bar graph : Give examples of at least three different types of bar graphs. Can the independent variable be depicted on both the vertical and horizontal axes? What are two ways multiple independent variables can be depicted in a bar graph?
Discuss the perceived impacts and challenges facing : As a result, the law has sought to adapt the rights, institutions, and treatment options available to an increasingly diverse juvenile population - gangs, substance abuse, mental health concerns, sexual orientation, cyber-stalking, cyber-bullying,..
Complement of avocados : a.) There is a large increase in the price of tomatoes, which is a complement of avocados (you know, because they go together in guacamole). b.) There are significant reductions in the amount of water that avocado farmers are allowed to use in ..
Name four different types of light sources : Describe their attributes and compare them with light sources found in the real world.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd