Reference no: EM132281368
Question: Review the bruteLogin function on p. 58 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.
You have been hired by a company to provide consultation on security and provide recommendations. Using Microsoft® Word, write a 1-page document explaining how the username and password are extracted from the password file. Describe what would happen if the script fails to open the password file.
Recommend and provide additional code that would better handle cases where the password file might not open.
Submit your assignment using the Assignment Files tab.
Linux systems keep user account information in the passwd file and the encrypted password in the shadow file.
The passwd file containing account information might look like this:
smithj:x:1001:1001:John Smith:/home/smithj:/bin/bash
The shadow file containing password and account expiration information for users might look like this:
smithj:KJDKKkkLLjjwlnttqoiybnm.:10063:0:99999:7:::
The fields in the shadow file are separated by a colon, with the first field being the username and the second the password.
Under normal circumstances, the password is encrypted but for the purpose of this assignment, you can assume the password is already unencrypted.
Review the bruteLogin function program on pp. 58 through 59 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.
Make the following changes/additions to the function:
• Modify the bruteLogin function to use both the passwd and shadow files. Assume your passwd and shadow files include two accounts.
• Change the bruteLogin to extract the username and full name from the passwd file and the password from the shadow file
• Change the output to display the full name when confirming successful FTP Login; e.g., "Myhostname FTP Logon Succeeded: John Smith/ KJDKKkkLLjjwlnttqoiybnm"
Capture screenshots of your code and output for each conversion. Paste the screenshot in a Word document.
What does it mean to censor art
: What does it mean to "censor" art? Who can censor? Who is able to, who is allowed to, and why? For the US, think about the Constitution: what does it say about.
|
What is the value of a one-month european call
: What is the value of a one-month European call option with a strike price of $39?
|
Provide a brief overview of the lapd rampart scandal
: Do you feel the Department and others failed to identify the extent of the problem and minimize its scope and nature? Explain.
|
What is the net cash flow from selling the machine
: If the company's marginal tax rate is 35%, what is the net cash flow from selling the machine:
|
How username and password are extracted from password file
: Review the bruteLogin function on p. 58 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration.
|
What is the year 4 cash flow
: This equipment will have a book value of $4,500 at the end of the project, but can be sold for $5,500. The tax rare is 40 percent. What is the year 4 cash flow
|
What will be the new degree of operating leverage
: What will be the new degree of operating leverage for 18,500 units and 16,500 units?
|
Calculate the amount that simeon
: Calculate the amount that Simeon will have to invest today to receive R10 000 at the end of year five by using the mathematical formula.
|
What is the merger premium expressed
: a. What is the merger premium expressed as a percent of Firm Y's stock price? What is the NPV of the acquisition if cash is used?
|