How username and password are extracted from password file

Assignment Help Programming Languages
Reference no: EM132281368

Question: Review the bruteLogin function on p. 58 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.

You have been hired by a company to provide consultation on security and provide recommendations. Using Microsoft® Word, write a 1-page document explaining how the username and password are extracted from the password file. Describe what would happen if the script fails to open the password file.

Recommend and provide additional code that would better handle cases where the password file might not open.

Submit your assignment using the Assignment Files tab.

Linux systems keep user account information in the passwd file and the encrypted password in the shadow file.

The passwd file containing account information might look like this:

smithj:x:1001:1001:John Smith:/home/smithj:/bin/bash

The shadow file containing password and account expiration information for users might look like this:

smithj:KJDKKkkLLjjwlnttqoiybnm.:10063:0:99999:7:::

The fields in the shadow file are separated by a colon, with the first field being the username and the second the password.

Under normal circumstances, the password is encrypted but for the purpose of this assignment, you can assume the password is already unencrypted.

Review the bruteLogin function program on pp. 58 through 59 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.

Make the following changes/additions to the function:

• Modify the bruteLogin function to use both the passwd and shadow files. Assume your passwd and shadow files include two accounts.

• Change the bruteLogin to extract the username and full name from the passwd file and the password from the shadow file

• Change the output to display the full name when confirming successful FTP Login; e.g., "Myhostname FTP Logon Succeeded: John Smith/ KJDKKkkLLjjwlnttqoiybnm"

Capture screenshots of your code and output for each conversion. Paste the screenshot in a Word document.

Reference no: EM132281368

Questions Cloud

What does it mean to censor art : What does it mean to "censor" art? Who can censor? Who is able to, who is allowed to, and why? For the US, think about the Constitution: what does it say about.
What is the value of a one-month european call : What is the value of a one-month European call option with a strike price of $39?
Provide a brief overview of the lapd rampart scandal : Do you feel the Department and others failed to identify the extent of the problem and minimize its scope and nature? Explain.
What is the net cash flow from selling the machine : If the company's marginal tax rate is 35%, what is the net cash flow from selling the machine:
How username and password are extracted from password file : Review the bruteLogin function on p. 58 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration.
What is the year 4 cash flow : This equipment will have a book value of $4,500 at the end of the project, but can be sold for $5,500. The tax rare is 40 percent. What is the year 4 cash flow
What will be the new degree of operating leverage : What will be the new degree of operating leverage for 18,500 units and 16,500 units?
Calculate the amount that simeon : Calculate the amount that Simeon will have to invest today to receive R10 000 at the end of year five by using the mathematical formula.
What is the merger premium expressed : a. What is the merger premium expressed as a percent of Firm Y's stock price? What is the NPV of the acquisition if cash is used?

Reviews

Write a Review

Programming Languages Questions & Answers

  Write a haskell program to calculates a balanced partition

Write a program in Haskell which calculates a balanced partition of N items where each item has a value between 0 and K such that the difference b/w the sum of the values of first partition,

  Create an application to run in the amazon ec2 service

In this project you will create an application to run in the Amazon EC2 service and you will also create a client that can run on local machine and access your application.

  Explain the process to develop a web page locally

Explain the process to develop a Web page locally

  Write functions

These 14 questions covers java class, Array, link list , generic class.

  Programming assignment

If the user wants to read the input from a file, then the output will also go into a different file . If the user wants to read the input interactively, then the output will go to the screen .

  Write a prolog program using swi proglog

Write a Prolog program using swi proglog

  Create a custom application using eclipse

Create a custom Application Using Eclipse Android Development

  Create a application using the mvc architecture

create a application using the MVC architecture. No scripting elements are allowed in JSP pages.

  Develops bespoke solutions for the rubber industry

Develops bespoke solutions for the rubber industry

  Design a program that models the worms behavior

Design a program that models the worm's behavior.

  Writing a class

Build a class for a type called Fraction

  Design a program that assigns seats on an airplane

Write a program that allows an instructor to keep a grade book and also design and implement a program that assigns seats on an airplane.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd