Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

ISSC456 Central Texas College Password Cracking Methods Discussion

ISSC456 Central Texas College Password Cracking Methods Discussion

ISSC456 Central Texas College Password Cracking Methods Discussion

Hello,

I need two responses of at least 100 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.

1) Using course resources and the Internet, please explain the following Password-Cracking Methods:

a. Brute-Force attack
b. Dictionary attack
c. Syllable attack
d. Rule-based attack
e. Hybrid attack
f. Password guessing
g. Rainbow attack


Student one:

A brute force attack is one of the most widely used methods of password attacks. Basically, its trial and error, where the computer attempts to gain entry by trying passwords until it comes across the correct one. Various software programs are used that will try every combination of likely credentials until the match is found. With the computing power available today, even the strongest algorithms may be broken, given enough time. (Kim & Solomon, 2014)

A dictionary attack is similar to a brute force attack in that it repeatedly tries certain credentials until it gets the right one, however, this type of attack relies on the idea that the user whose account is being attacked made a poor choice of password. The list of words used to attack the account is derived from, surprise, a dictionary. This doesn’t necessarily need to be the dictionary as we know it, as the attack will also substitute in symbols and letters to increase the number of combinations. (Kim & Solomon, 2014)

A syllable attack is a mixture of both a brute force and a dictionary attack. It will operate similar to that of a brute force, however, the “words” it uses are fragments of actual dictionary words, rearranged or combined into new forms to generate potential passwords. (Skillset, 2019)

A rule-based attack is used when the parameters of a password are known. The attacker will use these password rules, such as a number of characters, combined with number or symbol requirements. This allows the attacker to reduce the amount of time spent on attempts that would not meet the requirements anyway. (Skillset, 2019)

A Hybrid attack is a type of dictionary attack, but it is able to swap out various characters and letters in an attempt to find different versions of the same word. (Skillset, 2019)

Password guessing is really what all of these other attacks so far fall under. The name is self explanatory, and there are several methods that can be used, either manual, or automated, such as the previous examples. The previous examples are simply expediting the guessing process.

A rainbow attack is really cool. I had never heard of it before now, and the idea behind it is interesting. When passwords are stored, typically, the actual password gets hashed, and the hash value is then stored. When you put your password in in the future, it is hashed, then compared with the stored hash, and then access is granted. The Rainbow table attack is a faster brute-force. Rather than trying a different password every time, the passwords it would try are already hashed, and the instead, the values are compared. This simplifies the process to only matching hash values, as opposed to inputting the password, hashing it, querying the database for a match etc. This is beneficial in the sense that you don’t actually have to know the password, only the hash value (different passwords can actually generate the same hash value). One downfall of this is that the rainbow tables take up a significant amount of storage comparatively. (ParthDutt, 2018)

Nick

Kim, D., & Solomon, M. (2014). Fundamentals of information systems security(2nd ed.). Burlington, MA: Jones & Bartlett Learning.

ParthDutt. (2018). Understanding Rainbow Table Attack. Retrieved from https://www.geeksforgeeks.org/understanding-rainbo…

Skillset. (2019). What is a syllable password attack? Retrieved from https://www.skillset.com/questions/what-is-a-sylla…

Student two:

1) Using course resources and the Internet, please explain the following Password-Cracking Methods:

a. Brute-Force attack

Is a password cracking technique that attempts to use all character combinations to find the password. This technique can take a lot of time. It works best on 8 character or less passwords.

b. Dictionary attack

Dictionary attacks are similar to brute force attacks, but instead of using combination of characters it uses words from a dictionary.

c. Syllable attack

This attack combines brute force and the dictionary attack. The hacker takes syllables from all the dictionary words and combines them anyway the hacker can think of.

d. Rule-based attack

This attack is as advertise, the hacker sets up rules to run their program to try and crack the password. This allows the hacker to be creative with the rules. Some hackers only use this attack if they have some information on the attack to set the rules by. This is considered one of the more powerful attacks.

e. Hybrid attack

This attack is a combination of brute force and dictionary attacks. It takes words from the dictionary and adds characters in front and behind the dictionary words. For example, this type of attack might use college01 or college 001 and even 01college in an attempt to find the password.

f. Password guessing

Password guessing is when the hacker attempts to guess easy to remember passwords that the user might use. For example, the hacker might use names of children or relative.

g. Rainbow attack

I have heard of all these cracking techniques but this one. This attack is used on passwords that are nine characters or less. It uses a pre-defined table of hashes. Each table is set up for a specific length of passwords. Passwords are stored in computer systems as hashed functions instead of plain text. So, when you enter your password it is compared to the hash value stored in the table. If they match it is authenticated. What the hacker does is build hash tables and then attempts to make a match of the hash table stored on the computer. It is much faster than a brute force attack.

References:

Best Reviews. (n.d.). The Different Types of Password Cracking Techniques. Retrieved from https://password-managers.bestreviews.net/the-different-types-of-password-cracking-techniques.

Cracking Passwords: 11 Password Attack Methods (And How They Work). (September 18, 2017). Retrieved from https://datarecovery.com/rd/cracking-passwords-11-password-attack-methods-work.

Understanding Rainbow Table Attack. (n.d.). Retrieved from https://www.geeksforgeeks.org/understanding-rainbow-table-attack.

-Jamie

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Essay Noon only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Essay Noon are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Essay Noon are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Essay Noon, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20