Question: Three files are given inside the zip. Spend time trying to compromise passwords. Use whatever language / libraries you to compromise the passwords, but do
Three files are given inside the zip. Spend time trying to compromise passwords. Use whatever languagelibraries you to compromise the passwords, but do not use password crackers. It is ok to use existing data breaches from the internet but the use of rainbow tables are not allowed. Three files are given inside the zip. Spend time trying to compromise passwords. Use whatever
languagelibraries you to compromise the passwords, but do not use password crackers. It is ok
to use existing data breaches from the internet but the use of rainbow tables are not allowed.
What to submit:
A zip file named as your NetID eg ab with:
Three text files one for each password list where each line contains the original line
from the password file and the plaintext password separated by a space. No more than
lines in each file.
Files containing any source code used.
A pdf file explaining:
The technique you used to obtain the passwords
Other techniques you considered
How were the passwords stored? Compare the difficulty in cracking passwords
protected with each type of storage.
Rubric Very necessary for you!:
submitting working code which we can build and run, which follow the assignment
directions
turning in password files in the correct format and following all other submission rules
points cracking at least password from one database breach
points cracking at least password from two database breaches
points cracking at least password from three database breaches
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
