Which hash algorithm was used to hash these passwords

Assignment Help Computer Network Security
Reference no: EM131952143

Assignment Topic: Intrusion Detection and Hacker Exploits

In this assignment, you are provided with a list of password hashes. You need to identify:

1. Which hash algorithm was used to hash these passwords?

2. Which passwords have been hashed?

Each group is provided with a file containing 500 hash values, one per line.

The n-th group must use file group_n.txt. For instance, group 6 should work only on the hash values in group_6.txt.

Generate a plain-text password file containing all the passwords that you identified, one per line, as follows (password files encoded in formats other than plaintext, such as PDF or Word, will not be accepted, and you will be given 0 points):

123456

12345678

12345

iloveyou

...

Submit the code you wrote to recover the passwords and/or to identify the hash algorithm used to encode the passwords, and write a 1-page report (including references) explaining how the code works, and which hash was used to encode the passwords.

You can also use HashCat or John the Ripper, to recover the passwords. In this case, the report should include a step-by-step description of how you recovered the passwords (the page limit still applies). You cannot use online tools to reverse the hash values.

Include your name and group number in the report, but do not include a title page.

Items to Submit -

1. 1-page report.

2. Text file named group_n_passwords.txt containing the passwords you identified, one per line.

3. Any code you used to complete the assignment, not including the code of HashCat and John the Ripper.

Attachment:- Assignment Files.rar

Reference no: EM131952143

Questions Cloud

Examines the concept of supply chain clusters : You will write one a research paper that examines the concept of supply chain clusters. This paper will be based on subject matter taken from textbook.
Describe your it security policy framework implementation : Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program.
Analyze actual and potential health problems in childhood : Analyze actual and potential health problems in the childhood years using a functional health assessment and Erickson's Stages of Child Development.
Evaluate current remote access to enterprise : Create an Executive Summary for the deliverable. Create an inventory of the current assets and prioritize them in the order of mission criticality.
Which hash algorithm was used to hash these passwords : INCS-745 Assignment Topic: Intrusion Detection and Hacker Exploits. Which hash algorithm was used to hash these passwords
Which agency budgets would you increase and which decrease : If you could allocate resources differently, which agency budgets would you increase and which would you decrease (assuming the total would remain the same)?
Develop a swot analysis for your nab company : Develop a SWOT analysis for your NAB company using the SWOT matrix worksheet in the course text (p. 153 | SWOT: Strengths / Weaknesses / Opportunities
Constant growth model : You cannot use the constant growth model! Don't try it. You will not get the right answer.
Explain the differences between an ods dw and a data mart : Explain the differences between an ODS, DW, and a data mart. Explain the purpose of a Logical Data Model. What are some of the challenges facing a data miner?

Reviews

len1952143

4/21/2018 5:19:52 AM

Topic: Intrusion Detection and Hacker Exploits. Detailed Question: Assignment description is in file titled Assignment3. Items to Submit - 1. 1-page report, 2. Text file named group_n_passwords.txt containing the passwords you identified, one per line and 3. Any code you used to complete the assignment, not including the code of HashCat and John the Ripper. Items not to Submit - Anything not mentioned under items to submit. For example, do not submit: Eclipse projects, Program binaries, Keys and Sample plaintexts or ciphertexts.

Write a Review

Computer Network Security Questions & Answers

  Find typical detection rate for popular anti-virus software

CP5603:03-ADVANCED E-SECURITY ASSIGNMENT. Anti-virus software is popular for Microsoft Windows. Find the typical detection rate for popular anti-virus software

  Identify and evaluate strategies for crisis management

Identify and evaluate strategies for crisis management. Your paper should focus on the information technology perspective in terms of crisis management.

  How to form the trojan integrated cirucit

How to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the output

  White-hat hackers to breach systems

Go online and search for information about Operation Eligible Receiver. What details can you find? For example, which government systems were infiltrated? How difficult was it for white-hat hackers to breach those systems?

  What is relationship between hashing and digital signatures

PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI and PGP.

  Understanding of cryptography and its role to n/w security

Critical views on the advantages and disadvantages of technical solutions to security.

  Is web server running iis to present main application

is Web Server running IIS to present main application as web pages? Is a Server Running Microsoft SQL Server with patient data The Servers are connected to the LAN using routers and switches?

  Reliable transmission of large volume data

Modern network applications require reliable transmission of large volume of data with bounded delay, between users and data-centres and between data-centres, potentially half way around the earth. What are the limitations in using distributed data c..

  Compute an rsa based digital signature on a long message

Doing a digital signature with RSA alone on a long message would be too slow (presumably using cipherblock chaining).

  Critical to information security in the modern day

When considering the most critical to information security in the modern day, one of the most credible is one that has seen a recent increase in occurrence over the past decade. Deliberate software attacks on company information systems have becom..

  What is the goal of a flooding attack

What types of resources are targeted by such DoS attacks? What is the goal of a flooding attack? What types of packets are commonly used for flooding attacks?

  Explain how you came up with your encoding and decoding

Show your work here and explain how you came up with your encoding and decoding. If you want to reverse engineer an instruction the MARS assembler shows you the encoding of all assembled instructions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd