Question: Please finish this task and give the code for part 2 . py . Include screenshots too to understand better. There should be 2 other

Please finish this task and give the code for part2.py. Include screenshots too to understand better. There should be 2 other files which are (passwordhash.txt - contains the password hash list
passwords.txt - contains the list of common and leaked passwords from the sources) Part II: Breaking Password Hashes. Below, you are given a list of 30 hashed passwords (one password per line). The plain-
text versions of these hash values are either drawn from the English dictionary or are
among the most popular passwords revealed through data breaches over the years
(List of the most common passwords. I'm not giving any website link since chegg flags it.But you can look like it on wikipedia)).
To generate the hash values, the hashlib module in Python 3 was used.
The hashlib module provides hash functions such as md5, sha1, sha256, sha512,...etc.
The hash values are generated using a layer of hashing functions as follows: given the
plain-text password (lets call it myPassword), the final hash value (i.e., what you see in
the hash list below) is computed as: h6(h5(h4(h3(h2(h1(myPassword)))))),
where each distinct hi comes from the set {md5, sha1, sha224, sha256, sha384,
sha512}. Note also that the hash values you see below are obtained after
applying hexdigest() on the output of each hi . See the example below as to
how hexdiget() is used:
import hashlib
def md5_hash("secret"):
return hashlib.md5(plain_text).hexdigest()
Password Hash list:
7aab891e99736e4a7c140045c8bc125bf8332c1622a38e226027d6f0
85d949e6c8d70dc23a6fdaca46ad9635f8049334d6d215749820e456
1788816a7a3bd64ec18c43380d19706cee0f4f969872992d35caaaef
9c8993d145e38605506dc185c6bdff7c7b1d3d6d722d9d70c9dd999d
09db4a9ef01127088607cdacafc2100d8896326721765a8ee8fd79b6
0c14b9b4f88cb8e05e9d2846d58e9880d2e7fa5476318cedcfd310af
20b7fa58a9f4ea91574fced76f52e07a9e4426ad648aafef70ed6e50
946e3ea34f56e79fb390c81b6d833c19bc8ff44b49c4b73eb6943990
092f6ed9e20ee4487331586e89485cc1c9b86bb2d1973494e5feaead
68a70733f1583d2d6e4fcd274c50a642e9623c9bb928eae77597aaf9
b1bb54d73ce72159af19435440c023725744624db1a65a1145e95f0b
e8ec019609f060879dd0a2793b975ab0a9d59d16da7bba0531f8aa05
21c9e1c7379b4ac8fc12eabfccd43ae4dd184b8abd10731d48266009
69ad14debb0be41c9d93ba5f081ce0056a94021c0fb588a6044c8370
0b080b38b84502b98c2f72905f16ddcc6ec8bcc175fe6fea8a93fadf
a91844f2db56dd6c630c2810f235438082d4f7a6e828dcd8347898a9
44cd12b339328ee7d095d5f070273198c1babb6bcd19e01ec5b5dd55
867712a17e09817f5fb3759bc442262f58cd486a98da45b489669b4d
49cb32f2404da606540348e3b269c1b8d2ca37a2a77ca06c8f2c3c21
7cf5a8f792b2c88d6edead87b1529d141911bcd9aedd92206bb52be8
85eacf4b3682ee6abbf9383e3b0b6709860be73d02c9adff72d753cb
34ec093e373716546e80f29e3a6e0ba4f076039c4e7e1dabff8443b4
25b498582993d8bb1843ef0c60da72fca0231711aec9cdedb6f96e0f
728ff9ec4be937b1af1abe8e0827f596f830d5a7cbcb35e5b5fdbc3c
f8b92a0cb847fc3ed6247cca69077a51bfc86fd223b2aa2a5df208dc
386cdf16530f2cae19aa87de101de52c1ec3d7b58cacdb415995f8df
a92f78bed636a168e245f51c06917aa5bac30195abc1163508df92c2
024d2a253b9cf002655b796d811c31d90d28abc0f7b6e62ab0c5e7c8
c4053d99a42ea57c0a3fbd23945b0636f724132c76d6da6a62e426d6
2f1b7cbce5c13e1092f795027355c33101712e495a

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!