Password Cracking

Password Cracking

For lab 8 you will examine password cracking.

Password strength is the measure of a password’s efficiency to resist password cracking attacks. The strength of a password is determined by;

Length: the number of characters the password contains.
Complexity: does it use a combination of letters, numbers, and symbol?
Unpredictability: is it something that can be guessed easily by an attacker?
Let’s now look at a practical example. We will use three passwords namely

1. password

2. password1

3. #password1$

For this example, we will use the password strength indicator of Cpanel when creating passwords. The images below show the password strengths of each of the above-listed passwords.

https://cpanel.net/

This is a trial service and will work for you to look at the passwords.

The higher the strength number, better the password.

Let’s suppose that we have to store our above passwords using md5 encryption. We will use an online md5 hash generator to convert our passwords into md5 hashes.

The table below shows the password hashes.

PasswordMD5 HashCpanel Strength Indicatorpassword5f4dcc3b5aa765d61d8327deb882cf991password17c6a180b36896a0a8c02787eeafb0e4c28#password1$29e08fb7103c327d68327f23d8d9256c60

We will now use http://www.md5this.com/ to crack the above hashes. The images below show the password cracking results for the above passwords.

As you can see from the above results, we managed to crack the first and second passwords that had lower strength numbers. We didn’t manage to crack the third password which was longer, complex and unpredictable. It had a higher strength number.

Password cracking techniques

There are a number of techniques that can be used to crack passwords. We will describe the most commonly used ones below;

Dictionary attack– This method involves the use of a wordlist to compare against user passwords.
Brute force attack– This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack.
Rainbow table attack– This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.
Guess– As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.
Spidering– Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.
Spidering sample dictionary attack wordlist

1976 <founder birth year> smith jones <founder name> acme <company name/initials> built|to|last <words in company vision/mission> golfing|chess|soccer <founders hobbies

Examine the available software for Kali Linux.

John the Ripper

John the Ripper uses the command prompt to crack passwords. This makes it suitable for advanced users who are comfortable working with commands. It uses to wordlist to crack passwords. The program is free, but the word list has to be bought. It has free alternative word lists that you can use. Visit the product website https://www.openwall.com/john/ for more information and how to use it.

Cain & Abel

Cain & Abel runs on windows. It is used to recover passwords for user accounts, recovery of Microsoft Access passwords; networking sniffing, etc. Unlike John the Ripper, Cain & Abel uses a graphic user interface. It is very common among newbies and script kiddies because of its simplicity of use. Visit the product website http://www.softpedia.com/get/Security/Decrypting-Decoding/Cain-and-Abel.shtml for more information and how to use it.

Ophcrack

Ophcrack is a cross-platform Windows password cracker that uses rainbow tables to crack passwords. It runs on Windows, Linux and Mac OS. It also has a module for brute force attacks among other features. Visit the product website http://ophcrack.sourceforge.net/ for more information and how to use it.

In this practical scenario, we are going to crack Windows account with a simple password. Windows uses NTLM hashes to encrypt passwords. We will use the NTLM cracker tool in Cain and Abel to do that.

Cain and Abel cracker can be used to crack passwords using;

Dictionary attack
Brute force
Cryptanalysis
We will use the dictionary attack in this example. You will need to download the dictionary attack wordlist here 10k-Most-Common.zip.

For your exercise, create a few acccounts on both Linux and Windows VMs. Using the most common passwords, use Cane and Abel to attempts cracks on the passwords of varying size and difficulty. Also, think about changing the common passwords to see the difference in time. Record your findings.

Allied Health Community Navigation Instructions

Complete the following assignment using the Allied Health Community media provided in the study materials.

Allied Health Community Navigation Instructions

Open the Allied Health Community media application and click “Enter.”

You will then be brought to a screen with three options: Scenarios, Profiles, Timelines. For this course, you will click on “Scenarios.”

You will see a number of different scenarios for this class. Scroll down and click into “Operations and Risk Management in Health Care.” After reading the instructions and reviewing the legend, close the instructions dialogue box.

On the map you will see a number of different buildings. Hover your cursor over the buildings to see the pop-out label and choose a buildingapplicable tothis assignment.

For this assignment you will locate and click into “Home Care” on the right side of the map. Select the green “I” icon. Select the Home Care scenario titled “Quality Improvement Through Risk Management” and choose to Download Full Scenario, which will provide the full scenario and the five questions that you need to answer for this assignment.

Assignment Instructions

WithintheAllied Health Community media, read the “Home Care Scenario: Quality Improvement Through Risk Management.”

In a total of 250-500 words, respond to the questions located in the scenario.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion

You are not required to submit this assignment to LopesWrite.

Developing a Strategic Communication Plan

Imagine that you are a member of a team assigned by the police chief in your hometown to revise the organizations strategic communication plan. Your assignment is to utilize strategic approach that you have learned so far to develop your citys police departments strategic communication plan.
Write a two to three (2-3) page paper in which you:
Outline the approach that you would use to conduct research and interpret the situational analysis for your hometown.
Determine the main goals and objectives of your proposed communication plan. Predict the target group of your communication plan.
Propose the general communication strategies of your proposed plan. Provide a rationale for your response.
Develop the first four (4) main steps of your citys police departments strategic communication plan. Provide a rationale for your response.
Use at least two (2) quality academic resources as references, such as journal articles, newspapers, magazines, and publications from law enforcement associations. Note: Wikipedia, blogs, and similar websites do not qualify as quality academic resources.
Your assignment must follow these formatting requirements:
This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.

Class Book
Police Operations: Theory and Practice, Sixth Edition
Kren Matison Hess, Christine Hess Orthmann, and Henry Lim Cho

hat Is An Annotated Bibliography?An annotated bibliography is a list of citations to books, articles, and documents.

What Is An Annotated Bibliography?An annotated bibliography is a list of citations to books, articles, and documents. Each citation is followed by a brief paragraph called the “annotation.” The purpose of the annotation is to inform the reader of the relevance, accuracy, and quality of the sources cited.There are two types of annotated bibliographies. The “descriptive” annotated bibliography summarizes a source, describes why it is useful for researching a particular topic or question, and describes the author’s main arguments and conclusions. The “analytical” annotated bibliography includes the same elements, but it also analyzes what is written or argued. It critically examines the strengths and weaknesses of the author’s argument and conclusions.This assignment will require you to research and write an analytical annotated bibliography.You cannot use sources that are in our course materials – you must seek outside references. Your annotated bibliography will include bibliographic entries AND a narrative explanation of the source and how it will be used to answer your research question. Wikipedia, About.com, History.com, Ask.com and any online sources that do not contain source citations and author information are not allowed as sources for this assignment. These are sites for the general population and not considered appropriate for college-level work. Do not use them.Assignment InstructionsFor this assignment, you will do a search of UMUC’s databases forfive (5) articles in scholarly (peer-reviewed) journals on your chosen topic.Each citation should be between 250-300 words each. For help with this you should review this source from the UMUC Writing Center:http://www.umuc.edu/current-students/learning-resources/writing-center/writing-resources/evaluating-sources.cfm. You can also utilize the “Chat with a Librarian” feature. In the top menu under “Resources” click on “Library” and you should see the “Chat with a Librarian” feature on the right.Select a topic that will form the basis for your Annotated Bibliography and Annotated Webliography (your Annotated Webliography is due in Week 7).You should choose some topic that deals with some aspect of world history to 1500. This covers a broad area so you can use your imagination. For example, you could cover Egyptian Agriculture, medieval weaponry, or Roman aqueducts to name a few. If you are unsure whether your topic is acceptable, you should run it by your instructor for approval. Provide a complete citation for the site, including the URL and your date of access.Note that the required citation style is Chicago Manual of Style. For an example of what elements to include in your citation, go to Course Content and review the Brief Primer to Citing Sources in Chicago Humanities Style (B=bibliography). In the Sample Citations section, look under Online Journal Articles and note that you need to provide the name of the database you found the article in and your date of access.Analytical Annotated Bibliography Components:1. Begin each annotated bibliography entry by identifying the source in correct Chicago Manual of Style documentation.2. A brief description of the author’s topic, thesis, and methodology. In other words, in what academic discipline does the work fall in (history, literature, social science, women’s studies, cultural studies, etc.)? What kind of evidence does the author draw upon?3. A concise outline of the main points in the text.4. A statement about the author’s goals and his/her intended audience. Are there any clear biases?5. MOST IMPORTANTLY–Your critical evaluation of the text’s usefulness for the investigation of your topic. What are the strengths of the source? What are the deficiencies or limitations of the source?6. Did the article help you to further understand the topic? If so, explain how. If not, explain what information might have been helpful.7. Explain how each of your sources compares to the others. Are there any general trends you see in your selected books and articles?There are numerous websites that will show you how to construct an annotated bibliography. UMUC also has a guide to writing an annotated bibliography (requires Flash Player to view the video)http://www.umuc.edu/library/libhow/bibliography_tutorial.cfm.If your article has an abstract DO NOT CUT AND PASTE IT AND SUBMIT IT. That is plagiarism and will result in an investigation of your paper for a possible violation of the university’s academic integrity policy. Read the article and do your own summary.This assignment can be time consuming so do not let it get away from you. If you have any questions please email your instructor sooner rather than later. The grading rubric for the Annotated Bibliography is available in the module labeled “Rubrics”. You will find a sample Annotated Bibliography in the module labeled “Sample Assignments.” You may not use the articles from the sample. Additionally, the sample assignment is meant as a guideline as to what an ‘A’ paper is and is not intended to be a ‘perfect’ assignment.You will find a copy of the scoring rubric under the Discussion and Assignment Scoring Rubrics module under the Table of Contents. If you have any questions at all, please do not hesitate to ask. You have three ways to do this: 1) Post a question in this week’s discussion; 2) Post a question in the Ask the Professor module; or 3) Directly email your instructor.Due DateJul 14, 2020 11:59 PM