Question: Part 3 (5 points). The setting is identical as in Part 2 of this problem. One of the users in the file shadow has a
Part 3 (5 points). The setting is identical as in Part 2 of this problem. One of the users in the file shadow has a password that is a common word, but this word is not in the file common-passwords.txt. Your task is to find that one password. One way to solve this part is to search on the web files with common words that can be used in a dictionary attack. This means that after adding the password you found to the file common-passwords.txt, your program Cracker.java should find it in the shadow file. Write down the password you found and describe how you found the file you used for the dictionary attack (this includes writing the URL where you found this file).
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
