Cracking Apollo – default settings stated it would take the time listed I the time left field to crack the single password.
Cracking Apollo – change to alpha numeric, lower and upper case – pwd length 1 – 8 character. Did not register a time but was able to complete when the charset and length were changed.
Brute force remaining accts shown below. Times were not different when doing one or three at a time.
This is the result of all brute force attacks. Below is the result of doing a crack on all the accounts at the same time. It was quick with the character set at alpha numeric and numbers.
Results from Dictionary attack are shown below. It was able to identify two passwords that used words on that list. This did not take long to do and I was unable to capture overall time.
All Brute force and Dictionary attacks results – Cain main screen. I ran a crack on all accounts at the same time which show how long it would take to go through every combination of the charset for passwords up to 8 characters
Results from Ophcrack. It was able to crack the less complex passwords.
As you experiment with these password cracking tools, respond to the questions below as you share your findings in the project report.
Answer: The 4 types of character sets generally discussed are uppercase and lowercase letters, numerals and special characters. 2 of each set is the standard minimum.
Answer: As for a minimum, this varies per agency/organization. A minimum of 6. General rule is the longer the better, passwords of any size if salted would make rainbow tables (dictionary) attacks very unlikely.
Answer: Standard password policies recommend anywhere between 30-60 days. The pros for using the same password would be ease of access and laziness. You only have to remember one password. Cons are just the opposite, if the password was compromised, the username/password would work on all the accounts.
Answer: Ethical issues of using password cracker and recovery tools stem from intent. If used for malicious activities they are bad. There are no limitation, policies or regulations that limit these tools for use on privately owned machines or home networks. In most businesses networks, intranets or internets the use of them is illegal if used for malicious intent. Penetration testing teams sign rules of engagement before using these tools.
Answer: Before any penetration testing occurs, a rules of engagement must be completed by the sponsor and the security team doing the test.
To export a reference to this article please select a referencing stye below.
Assignment Hippo (2022) . Retrive from https://www.assignmenthippo.com/sample-assignment/cracking-apollo
"." Assignment Hippo ,2022, https://www.assignmenthippo.com/sample-assignment/cracking-apollo
Assignment Hippo (2022) . Available from: https://www.assignmenthippo.com/sample-assignment/cracking-apollo
Assignment Hippo . ''(Assignment Hippo,2022) https://www.assignmenthippo.com/sample-assignment/cracking-apollo accessed 05/10/2022.
Want to order fresh copy of the Sample Template Answers? online or do you need the old solutions for Sample Template, contact our customer support or talk to us to get the answers of it.
Our motto is deliver assignment on Time. Our Expert writers deliver quality assignments to the students.
Get reliable and unique assignments by using our 100% plagiarism-free.
Get connected 24*7 with our Live Chat support executives to receive instant solutions for your assignment.
Get Help with all the subjects like: Programming, Accounting, Finance, Engineering, Law and Marketing.
Get premium service at a pocket-friendly rate at AssignmentHippo
I was struggling so hard to complete my marketing assignment on brand development when I decided to finally reach to the experts of this portal. They certainly deliver perfect consistency and the desired format. The content prepared by the experts of this platform was simply amazing. I definitely owe my grades to them.