Question: Three files are given inside the zip. Spend time trying to compromise passwords. Use whatever language / libraries you to compromise the passwords, but do

Three files are given inside the zip. Spend time trying to compromise passwords. Use whatever language/libraries you to compromise the passwords, but do not use password crackers. It is ok to use existing data breaches from the internet but the use of rainbow tables are not allowed. Three files are given inside the zip. Spend time trying to compromise passwords. Use whatever
language/libraries you to compromise the passwords, but do not use password crackers. It is ok
to use existing data breaches from the internet but the use of rainbow tables are not allowed.
What to submit:
A zip file named as your NetID (e.g. ab123) with:
Three text files (one for each password list) where each line contains the original line
from the password file and the plaintext password separated by a space. No more than
100 lines in each file.
Files containing any source code used.
A pdf file explaining:
The technique you used to obtain the passwords
Other techniques you considered
How were the passwords stored? Compare the difficulty in cracking passwords
protected with each type of storage.
*Rubric (Very necessary for you!):
+40 submitting working code which we can build and run, which follow the assignment
directions
+20 turning in password files in the correct format and following all other submission rules
+15 points cracking at least 1 password from one database breach
+10 points cracking at least 1 password from two database breaches
+4 points cracking at least 1 password from three database breaches
Three files are given inside the zip. Spend time

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!