Conference PaperPDF Available

A Real-World Password Cracking Demonstration Using Open Source Tools for Instructional Use

Authors:
A Real-world Password Cracking Demonstration
Using Open Source Tools for Instructional Use
Tejaswi Kakarla, Aakif Mairaj, Ahmad Y. Javaid
Electrical Engineering and Computer Science Department
University of Toledo, Toledo, OH 43606, USA
E-mail: Tejaswi.Kakarla@rockets.utoledo.edu,Aakif.Mairaj@rockets.utoledo.edu, Ahmad.Javaid@utoledo.edu
Abstract— Passwords are the among the most standard ways
to protect and authenticate the security of a network or any other
confidential information. Password cracking helps in the
penetration testing so that we can find out the strength of a
password. In this paper, we are going to discuss different types of
password cracking tools with an emphasis on THC Hydra. We
are also going to discuss different types of attacks that can be
launched by password cracking tools. The paper specifically
demonstrates the attack of THC Hydra on an FTP server and an
SSH server that can be used in the teaching of a foundational
cybersecurity course. We conclude the paper with a discussion on
several actions that can be taken for end-user protection.
Keywords-Hydra; Dictionary attack; Bruteforce attack; server;
cracking
I. INTRODUCTION
The technological advances in the last decade have brought
many new concepts like Cybersecurity into the picture.
Cybersecurity is the set of processes designed to protect
important data from attack or unauthorized access. Frequent
security breaches in the last few years have led the people to
educate themselves regarding the protection of valuable
information against any malicious attack. The year 2017
witnessed many high-profile data breaches; for example, the
increase in crypto-currency related malware is becoming a
popular and profitable choice for cybercriminals [1]. Computer
security, therefore, depends on all users being aware of the
risks and taking responsible action to avoid these risks.
This paper deals with one aspect of cybersecurity, i.e.,
Password cracking. Password cracking is a term used to
describe the penetration in a network to unlock a protected
resource with or without tools. Passwords are the most standard
form of authentication during a login process. Password-based
authentication is used by comparing the credentials provided
by a user with stored secrets. Password cracking ranges from
decrypting a password to hacking into a network. In this paper,
we explain about different types of attacks and tools available
to implement the attacks. The explosive growth of technology
has brought forward many password cracking tools which are
available for free on the web. These password cracking tools
are developed by the technology buffs who treat hacking as an
‘art’ form.
This paper discusses the different types of attacks and tools
used in password cracking and provides the basic information
on the general do’s and don’ts to secure valuable information
against unauthorized users.
II. PASSWORD CRACKING TECHNIQUES
The main goal of a hacker is to gain access to your private
information for monetary gain by demanding ransom or
selling it to your opponent. Figure 1 [2] shows some scenarios
and attempts at password cracking. There are five main types
of password cracking techniques: Dictionary attack, Brute
Force attack, Hybrid attack, Rainbow tables attack and social
engineering attack.
A. Dictionary Attack
This type of attack tries to find its decryption key by
repeatedly trying millions of most likely possibilities, such as
all the words in a dictionary. In a dictionary attack, a wordlist
comprising of most likely passwords is used by the hacker
while attempting to gain access to a system [3]. In Addition,
wordlists that have proven to be the most successful are
composed of various public sources and are easily available
online [4]. Several wordlists are available; the most common of
which is “rockyou.txt.”
B. Brute Force Attack
In a Brute Force attack, the user uses every possible
combination of the alphabet hoping that at least one
combination is correct. This attack is faster when it is used to
check for short passwords. The only drawback of this method
is that, if the password is a long one it takes longer to find the
right password, hence consumes lots of system resources. [5]
Figure 1: The flow of password attacking possibilities [2]
978-1-5386-5398-2/18/$31.00 ©2018 IEEE
0387
C. Hybrid Attack
Hybrid Attack is a blend of both the dictionary attack and
the Brute Force attack. It requires a list of possible passwords
like the dictionary attack, but it will attempt all the possible
combinations with the passwords present in the list like a Brute
Force attack [4]. It takes a very long computational time
compared to other attacks based on the number of passwords
present in the list.
D. Rainbow Tables Attack
The Rainbow tables attack uses a pre-existing table to
reverse the cryptographic hash functions. Rainbow Tables
benefit the person constructing those precomputed tables since
he can choose required storage by selecting the number of links
in each chain [6]. If there are more links between the initial
value and the final value, then more passwords are seen. There
is one weakness in this attack though, the person building the
chains do not select the passwords they capture; hence
Rainbow Tables cannot be optimized for general passwords.
E. Social Engineering attack
Social Engineering attack is an inclusive term for all
different attacks that occur due to Human interaction. These
attacks occur in numerous steps - at first, the attacker gets to
know the victim and identifies the potential points of entry,
then the attacker gains the trust of the victim, thereby gaining
the knowledge of sensitive information, which in turn will
provide him the access to critical resources [7].
III. PASSWORD CRACKING TOOLS
In the previous section we discussed various types of
attacks, now this section is focused on different tools that are
available on the web and can implement such kinds of attacks.
Some of these tools are available for password cracking. For
example, the likes of John the Ripper [8], THC Hydra [9],
Rainbow Crack [8], Cain and Abel [8] and Medusa [9].
A. John the Ripper
John the Ripper is a slow password cracker - initially, it
was meant for UNIX. However with time, it became more
versatile, and now it is implementable on windows, OpenVMS
and MAC OS. Its primary purpose is to detect weak Unix
passwords. This tool is available for free and supports both
Brute Force and dictionary attacks. It is a time-consuming
password cracking tool.
B. THC Hydra
THC Hydra is a password cracking tool that can perform
very fast dictionary attacks against more than fifty protocols
like HTTP, HTTPS, FTP, etc. It is a fast and stable Network
Login Hacking Tool which uses a dictionary or brute-force
attacks to try various password and login combinations on a
login page. This tool was developed by Van Hauser and is
easily available online at GitHub where all its newest releases
are frequently updated. It is a fast and flexible password
cracker.
C. Rainbow Crack
Rainbow Crack is a hash cracker tool that makes use of a
large-scale time-memory trade-off. A common Brute Force
attack tries every possible plaintext one by one, which is time-
consuming for complex passwords, but this tool uses a time-
memory trade-off to do an advance cracking time computation
and store results in “rainbow tables.” Password crackers take a
long time to precompute tables, but this tool is hundreds of
times faster than a Brute Force once it finishes the
precomputation. This attack generates all possible plaintexts
and calculates the corresponding hashes. Then it compares the
calculates hashes with the hash to be decrypted. when the
hashes match each other, the plaintext is found. It is available
for Windows, Linux operating systems and runs on both
command line and user interfaces. It also supports computing
on a multicore processor.
D. Cain and Abel
Cain and Abel is a password recovery tool exclusive to
windows. It allows easy recovery of various kinds of
passwords by sniffing the network; cracking encrypted
passwords using Dictionary, Brute-Force, Cryptanalysis attacks
and network packet sniffing [10]. It relies on an IP to MAC
address resolver, ARP spoofing, and LSA secret dumper. It is
used for WEP cracking, and it provides us with a facility to
record VoIP. It speeds up the packet capture speed by wireless
packet injection.
E. Medusa
Medusa is a password cracking tool which can be used in
Linux and MAC OS X operating systems. This tool focuses on
cracking passwords by Brute Force attack. It can perform rapid
attacks against a large number of protocols, for example,
TELNET, HTTP, HTTPS, databases, and SMB. It uses a
thread based parallel testing, which can be used on multiple
hosts at once. This tool has different modules, and each is
available as an independent file.
IV. TECHNICAL APPROACH
In this section, we will expand more on the technicalities of
THC Hydra, the tool developed by Van Hauser. For the
execution of Hydra following syntax is essential:
hydra -S -l <victims email> -P <path of the file in which the
passwords are stored> -e ns -V -s <port number> <server>
smtp
A. Hydra in FTP Server
To launch an attack on an FTP server the command used is:
hydra -l usernames.txt -P passwordlist.txt ftp://ftpserver1
The -L and -P switches are used to loop through the files
named usernames.txt and passwordlist.txt to create various
combinations of usernames and passwords to try.
0388
Hydra will then generate a result over a period of few
minutes and show us how many attempts were successful while
using all the different possible combinations for passwords.
The authentication login ftpserver1 can be viewed to double
check the success of the Brute Force attack. The attack is
shown above in Figure 2 [9].
B. Hydra in SSH Server
Launching an attack on the SSH server is done in the same
way as the FTP server, the only modifications are the
service://hostname setting is changed to ssh://ftpserver1. To
launch an attack on an SSH server the command used is: hydra
-l usernames.txt -P passwordlist.txt -t 4 ssh://ftpserver1
Here the -t 4 switches are used to adapt the number of
simultaneous authentication attempts to better suit the default
configuration of many SSH services. Launching a Brute Force
Attack on SSH service is slower and more unreliable than
attacking an FTP service. This is because many SSH services
are configured to limit the amount of failed login attempts from
a particular attacking host by default. Example of such is
shown above in Figure 3.The log entry shows that the SSH
server disconnects the user Helga after many failed
authentication attempts. Each time it disconnects, it will add on
to the time taken by the Brute Force algorithm to complete the
task. Despite setting the tries, the Brute Force attack on an SSH
server can be unsuccessful even though we have the
combination of username and password in the list as shown in
Figure 4.
C. Hydra in SMTP Server
Fi
g
ure 2 Exam
p
le of H
y
dra in SSH Server
[
9
]
Figure 5 Unsuccessful Brute Force [9]
Figure 4 Implementation of Hydra for SMTP Server
Fi
g
ure 3 H
y
dra in FTP Server
[
9
]
0389
The Mail servers commonly use SMTP authentication
protocol to identify a valid user before email acceptance for
delivery. There are many standards for SMTP authentication.
We are using AUTH LOGIN method.
This specific authentication method is supported by many
common SMTP servers and therefore it is a good protocol to
use. This protocol is simple and uses just the unencrypted
credentials. Even though this protocol is not very secure, many
of the mail servers support it in their default configurations.
This protocol can be put into use with telnet command aimed
at port 25 on an available mail server. If the currently used
username and password are correct, the server gives us a 2xx
status code. If the username and password are wrong, then the
server gives us a 5xx response code [11]. The command
prompt used to hack into a Gmail server using THC Hydra and
the commands used with description is shown in Figure 5.
This has been accomplished with Windows 10 using STMP
server without disabling any security features of Gmail. Not
disabling the security features of Gmail generates a security
warning which will be sent to the victim's email. It is shown in
Figure 6.
Commands:
x-l: log in or -L FILE login with LOGIN name, or load
several logins from FILE
x-p: PASS or -P FILE try password PASS, or load
several passwords from FILE
x-C FILE: colon separated "login: pass" format,
instead of -L/-P options
x-M FILE: list of servers to attack, one entry per line,
':' to specify port
x-t: TASKS run TASKS number of connects in
parallel per target (default: 16)
x-U: service module usage details
x-h: more command line options (COMPLETE
HELP)
xserver: the target: DNS, IP or 192.168.0.0/24 (this
OR the -M option)
xservice: the service to crack (see below for supported
protocols)
xOPT: some service modules support additional input
(-U for module help)
The different ports and servers that can be used are:
1. Port for Gmail=465
2. Server for Gmail= smtp.gmail.com
3. Port for yahoo=465
4. Server for yahoo=smtp.mail.yahoo.com
5. Port for red mail=587
6. Server for redmail=smtp.live.com
Steps for Execution [12]:
a) Select your target:
You have three options on how to specify the target you
want to attack:
1. A single target on the command line: just put the IP
or DNS address in
2. A network range on the command line: CIDR
specification like "192.168.0.0/24"
3. A list of hosts in a text file: one line per entry.
b) Select your protocol:
Try to avoid Telnet, as it is unreliable to detect a correct or
false login attempt. Use a port scanner to see which protocols
are enabled on the target.
c) Check if the module has optional parameters:
hydra -U PROTOCOL, e.g. hydra -U smtp
d) Select the destination port:
This is optional if no port is supplied the default common port
for the PROTOCOL is used. If you specify SSL to use ("-S"
option), the SSL common port is used by default.
V. PROTECTION AGAINST PASSWORD CRACKING
We can always add another layer of protection to our
passwords by using the methods like strengthening your
password, Salting, Hybridized authentication and a few
general to-dos which are mentioned below:
A. Strengthening your password
xStrengthen your password so that it has a minimum
of 8 characters.
xUse both small and capital letters in your password.
xUse a special character in your password like: @, #...
xChanging your passwords monthly, even
occasionally, is a good practice.
xUse a personal algorithm to create a password.
Following these guidelines should strengthen your password
and increase the time it requires to crack the password.
Figure 6. Security Warning in Gmail
0390
B. Salting
Salting refers to adding a few bits of information called
salt to a password before it is hashed [13][15], to make it a
little bit more difficult to crack. These salts prevent the
attacker from using the rainbow table to decrypt the
password hashes. Even though salting is pretty easy and
straight, it is pertinent that we do it in the right order.
For example, for every password, a different salt should be
created so that a rainbow table will not be created for the
set of passwords. A large salt value is preferred to a
smaller one, and all the salt values should be randomly
generated [14].
C. Hybridized Authentication
Password form of authentication can be combined with
any other forms of authentication such as fingerprinting,
face detection, tokens, cards, etc. thereby making the
cracking tools less effective.
D. General To-Do’s
xUpdate your OS and other software frequently. This
keeps hackers from accessing your computer through
vulnerabilities in outdated programs.
xDownload up-to-date security programs, including
antivirus and anti-malware software, anti-spyware,
and a firewall.
xDestroy all traces of your info on hardware you plan
on selling.
xDo not use open WIFI; it makes it too easy for
hackers to steal your connection and download illegal
files. Protect your WIFI with an encrypted password,
and consider refreshing your equipment every few
years.
xDon’t link accounts. If you want to comment on an
article and you are prompted to sign in with Twitter
or Facebook, do not go behind the door.
“Convenience always lessens your security posture,”
xWe need to use different passwords for different
accounts, even though it is easy to just use one
password for all accounts it just makes you more
vulnerable.
VI. CONCLUSION
In this paper, we introduced the topic of cybersecurity,
passwords and their cracking in general. This was followed by
a discussion on numerous potential attacks and their
executions. Implementation of attacks through numerous
available tools was discussed briefly. Later sections of this
paper mostly revolve around the application of THC Hydra as a
tool for hacking the Gmail account - it was underpinned with
several executed examples on servers, like FTP, SSH, and
SMPT. In the end, a subsection dedicated to Do’s and Don’ts
provides useful information regarding the precautionary
approach for securing the email account.
REFERENCES
[1] Bryan Degro, “Software crackers” [online]. Available:
http://web.eng.fiu.edu/~aperezpo/DHS/Std_Research/Researchpaper.pdf
[Accessed: 20th January 2018]
[2] Password Cracking Sam Martin and Mark Tokutomi at
https://www2.cs.arizona.edu/~collberg/Teaching/466-
566/2012/Resources/presentations/2012/topic7-final/report.pdf
[3] Y.S. Dandass, "Using FPGAs to parallelize dictionary attacks for
password cracking," in Hawaii International Conference on System
Sciences, Proceedings of the 41st Annual, Hawai, 2008, pp. 485-485
[4] C. Yiannis, "Modern Password Cracking: A hands-on approach to
creating an optimised and versatile attack.," Surrey, Thesis 2013.
[5] Blog - https://hackertarget.com/brute-forcing-passwords-with-ncrack-
hydra-and-medusa/
[6] Informationtechnology,https://security.stackexchange.com/questions/37
9/what-are-rainbow-tables-and-how-are-they-used [online], Accessed:
10th February 2018
[7] Webroot.https://www.webroot.com/blog/2017/03/21/common-social-
engineering-attacks/
[8] Fossbytes - https://fossbytes.com/best-password-cracking-tools-2016-
windows-linux-download/ [oniline]. Accessed 10th February 2018
[9] Robert svenson – From hacking to report writing.[online].
[10] A. E. .Mohamed. (2013, January) Password Cracking Using Cain &
Abel. [Online]. http://resources.infosecinstitute.com/passwordcracking-
using-cain-abel/
[11] Nitesh Dhanjani, Justin Clarke – Network security tools: writing,
hacking and modifying security tools
[12] B.Groza, "Analysis of a Password Strengthening Technique and Its
Practical Use," in 2009 Third International Conference on Emerging
Security Information, Systems and Technologies, Athens, Glyfada,
2009, pp. 292-297
[13] M. Abadi, T. Mark A. Lomas, and R. Needham, "Strengthening
passwords," digital Systems Research Center, Palo Alto, California,
Technical Note September 1997.
[14] U. Mamber, "A simple scheme to make passwords based on one-way
functions much harder to crack. Computers & Security, 15(2), 171-
176.," Computers & Security, vol. 15, no. 2, pp. 171-176, 1996.
[15] The State of Modern Password Cracking by Christopher Camejo.
[online].https://www.rsaconference.com/writable/presentations/file_uplo
ad/pdac-w05_the_state_of_modern_password_cracking_final.ppt.pdf
0391
... Based on the hash data analysis search on www.virustotal.com, as shown in Figure 17, the results show that the application that runs the ELF format file is THC Hydra, a tool commonly used by hackers for password cracking [35]. ...
... This attack with THC Hydra utilizes a brute force method that uses a dictionary containing many passwords in trying passwords or usernames to enter a system illegally [35]. ...
... One terabyte of RAM, a high processing speed of 134.35 GHz, and a storage capacity of 30 terabytes. ...
Article
Full-text available
Increased public activity in cyberspace (Internet) during the Covid-19 pandemic has also increased cybercrime cases with various attack targets, including E-Government services. Cybercrime is hidden and occurs unnoticed in E-Government, so handling it is challenging for all government agencies. The characteristics of E-Government are unique and different from other service systems in general, requiring extra anticipation for the prevention and handling of cybercrime attack threats. This research proposes log and event data analysis to detect cybercrime in e-Government using System Information and Event Management (SIEM). The main contribution of this research is a simple, fast, and accurate cybercrime detection process in the e-Government environment by increasing the level of log and event data analysis with the SIEM approach. SIEM technology based on machine learning and big data is implemented with Elastic Stack. The implemented technique can be used as a mitigation program against cybercrime threats that often attack and target e-Government. With simple, accurate, and fast cybercrime detection, it is expected to improve e-Government security and increase public confidence in public services organized by government agencies.
... This attack is faster when it is used to check for short passwords. The only drawback of this method is that, if the password is a long one it takes longer to find the right password, hence consumes lots of system resources [23]. The John the Ripper cracking tool and the Hashcat cracking tool are successful in a Brute force attack, cracking all 5 input samples that are hashed using the proposed modified SHA-512 and the normal SHA-512. ...
Article
Full-text available
Email security, particularly against phishing, spoofing, and distributed denial-of-service (DoS) attacks, is a pressing concern given the essential role email plays in accessing various online accounts. The study introduced a modified SHA-512 algorithm, implementing additional security layers including randomly generated salt and the Bcrypt algorithm. The modified SHA-512 was comprehensively evaluated on parameters like hash construction, computational efficiency, data integrity, collision resistance, and attack resistance. The results showed its avalanche percentage exceeded the 50% target, reaching 50.08%. Experimental hash-cracking failed to decode the hashes created by the modified algorithm, verifying its protective efficiency. The algorithm also successfully demonstrated data integrity and collision resistance. This indicates that the enhanced SHA-512 algorithm is an effective, more secure hashing method, particularly applicable to email addresses.
... website login forms which can have time limits and locks). This enables brute force, dictionary and hybrid attacks [21]. For this reason, additional capabilities enabled by WinRAR can be used to further enhance RAR archive security. ...
Conference Paper
Roshal Archive (RAR) format is one of the most widely used data archive formats, enabling users to reduce the size of data and protect it with the desired password before the data is transferred to its intended recipients over the network. This work focuses on the security of encrypted RAR archives and various different approaches for their decryption. Two different datasets composed of randomly generated and real-world user passwords were used for deploying brute force and dictionary attacks on password-protected RAR archives. Two available and widely used tools, John the Ripper and Hashcat, were used for cracking passwords of encrypted RAR3 and RAR5 archives. Experimental results indicate that both brute force and dictionary attacks were unsuccessful for RAR archives protected with randomly generated passwords, even of very small length. Real-world user passwords were successfully cracked only partially by brute force attacks, whereas dictionary attacks were very successful. The success rate for RAR5 archives was only slightly lower than for RAR3 archives and processing times were similar, indicating that this new version of the RAR format does not significantly improve data security. Instead, the security of RAR archives can be increased by using longer passwords more similar to randomly generated data, which are not present in commonly used dictionaries, as indicated by the experimental results.
... They also discussed the use of password meters to measure password strength [32] and password checkers used to prevent users from creating simple and common passwords [35]. Weak passwords can be enhanced using several strategies, such as composition-based password enhancement [36], analyze-modify password enhancement [35], password enhancement based on semantic transformation [37], and conversion-based password enhancement [38]. For example, vowels can be converted to consonants or removed from proposed passwords [8]. ...
Article
Full-text available
With the increasing prevalence of cyber attacks and data breaches, the importance of strong passwords cannot be overstated. Password generating software has been widely used to generate complex passwords that are difficult to crack, but it has its limitations. One of the main problems with this kind of software is that it often generates passwords that are difficult to remember, leading to users write them down or reuse them across multiple accounts. In recent years, prompt models such as ChatGPT have emerged as a promising solution for generating strong and memorable passwords. By leveraging machine learning algorithms, these models can generate unique and complex passwords tailored to individual users’ preferences, making them easier to remember and more secure. However, the use of prompt models to generate passwords also raises concerns about exposing vulnerable passwords. Hackers can potentially use these models to predict passwords by analyzing a user’s online activity and personal data. Additionally, the constant need to change passwords to stay secure poses a challenge for both password generating software and prompt models. As technology continues to evolve, finding a balance between password security and user convenience remains a complex issue. While prompt models such as ChatGPT can offer a promising solution, it is essential to consider the potential risks and challenges associated with their use, including the constant need for password changes and the potential vulnerability of the generated passwords.
Chapter
Full-text available
This study aims to study the evolution of self-regulation skills when adopting B-learning schemes among undergraduate students, using a sample of 68 students who use a blended learning strategy. This study was designed as a longi- tudinal study to grasp the evolution of self-regulation skills among learners over a one year of adopting blended learning classes. Repeated measures ANOVA design has been used to analyze the longitudinal data over three waves survey. Repeated measure ANOVA was used to test the change of the groups’ mean over time. The data of the study has been collected through three waves from the undergraduate students. The three waves of data collection were spaced four months apart. The study found that help-seeking and self-evolution have evolved significantly while the environment structuring, goal setting, time management, or task strategies skills didn’t evolve significantly. The study has come up with practical recommendations of how to improve the interaction between learners and the blended learning scheme.
Book
This book sheds light on the fundamental and innovative topics in information systems and their societal impact on individuals and organizations. It mainly focuses on the role of artificial intelligence in organizations, human-computer interaction, IS in education and industry, and IS security, privacy, and trust. The outcomes are expected to assist the decision-makers in formulating the required policies and procedures for using cutting-edge technologies.
Conference Paper
Operating systems and data protection tools are employing sophisticated password derived encryption key techniques in order to encrypt data. Such techniques impose a significant computational burden on forensic tools that attempt dictionary attacks are requiring cryptographic hash generation functions to be called several thousand times for each password attempted. In order to improve throughput, forensic analysis tools are designed to operate in a distributed manner over a dedicated network of workstations. This paper describes an FPGA-based hardware implementation of the standard CPSK#5 technique published by RSA Laboratories for generating password-derived encryption keys. This is the most computationally demanding step required when performing a dictionary attack on modern password-protected systems. The initial FPGA implementation incorporates four password-derived encryption key generation units operating at a frequency of 150 MHz and is capable of processing over 510 passwords per second. The implementation's performance can be easily improved by incorporating additional key generation units.
Article
We present a simple scheme that makes guessing passwords based on one-way functions 100 to 1000 times harder. The scheme is easy to program and easy to incrementally add to existing schemes. In particular, there is no need to switch to it all at the same time. Old passwords will still work and have the same security as before (one will not be able to distinguish them from new passwords); newly-entered passwords will become much more secure. The new scheme is independent of the one-way function used and does not require changing any part of the encryption mechanism.
Conference Paper
Besides commonly used password strengthening techniques such as salting or repeated applications of a one-way function on the password, we account a less common procedure: the truncation of the output from a one-way function on the password. This technique is used in a Norwegian ATM and a similar method is part of an authentication protocol from Anderson and Lomas which makes use of collision-full hash functions. We depict a probabilistic bound on the probability of guessing the password in the Anderson-Lomas protocol and we propose some improvements on the protocol. Further, the improved protocol proves to be a good solution for a password based authentication between two devices that authenticate in the absence of a previously known secret or of a trusted third party. The protocol proves to have all the desired properties for this scenario.
Article
Despite their notorious vulnerability, traditional passwords remain important for security. In this paper we describe a method for strengthening passwords. Our method does not require users to memorize or to write down long passwords, and does not rely on smart-cards or other auxiliary hardware. The main cost of our method is that it lengthens the process of checking a password. Contents 1 Introduction 3 2 Strengthening User Passwords 4 3 Strengthening Secrets over a Network 6 4 Comparisons 9 5 Conclusion 10 References 10 1 Introduction Traditional passwords are still the most common basis for user authentication. Even systems with sophisticated cryptographic protocols often employ user passwords, for example for encrypting keys. It seems likely that passwords will be pervasive for some time. Passwords are notoriously vulnerable to attacks [MvOV96, Sch96]. Users often have weak passwords because strong passwords are long and hard to remember. Furthermore, password protection weak...
Password Cracking Using Cain & Abel
  • A E Mohamed
Modern Password Cracking: A hands-on approach to creating an optimised and versatile attack
  • C Yiannis
C. Yiannis, "Modern Password Cracking: A hands-on approach to creating an optimised and versatile attack.," Surrey, Thesis 2013.
The State of Modern Password Cracking by
  • Christopher Camejo
January) Password Cracking Using Cain & Abel
  • A E Mohamed
A. E..Mohamed. (2013, January) Password Cracking Using Cain & Abel. [Online]. http://resources.infosecinstitute.com/passwordcrackingusing-cain-abel/