Online Password Cracking

Superior Essays
Passwords have been used for the purpose of authentication since Roman Periods.
Password-based systems, Validation based on something what the user knows about their identity are generally more common and necessary to access the available resources in World
Wide Web through networks and the internet (Vaithyasubramanian & Christy, 2015).
Cracking user passwords online is one of the essential skills in hacking and penetration testing with the aim is to illegitimately access the system through an authenticated user. Since website authentication commonly requires username and password in which the username can be the email address, it is imperative for the perpetrator to acquire the username before dealing with the password. When the username is
…show more content…
The next chapter explains the methods used for this type of attack from the literatures then it is followed by elaboration of the countermeasures. A detailed discussion on the tools and techniques needed to aid the forensic investigation.
A. User Passwords
One factor that contributes to the effectiveness of the online password cracking attack is the easily-guessed passwords of the users. Voyiatzis, Fidas, Serpanos, Avouris, et al. (2011)ONLINE PASSWORD CRACKING
6
provide an analysis on 19,000 actual passwords from different datasets. They come up with factors that generally describe that characteristics of the passwords such as the average length of less than 7 characters and mostly alphanumeric characters are used.
Das, Bonneau, Caesar, Borisov, and Wang (2014) point out the issue of reusing password across multiple websites which can be of leverage to the perpetrators in password guessing. A survey is conducted which denotes that 43-51% of users use the same password in their accounts on different websites. Thus, it is imperative for users to have a different password for each website account.
B. Acquiring User
…show more content…
The results yield that basic16 policy, which is composed of at least 16 character passwords, is the most superior. Das et al. (2014) also describes the password policies incorporated on some well-known websites in social, blogging, email, shopping, and financial categories. There are similarities across social, blogging, and email websites wherein majority implements a minimum of 6 and 8 character password policy.
Another approach to password creation is by using mnemonic passwords which is recommended by Kuo et al. (2006). A survey is initiated to create a user generated mnemonic passwords then it is compared with control passwords. An example of mnemonic password
"SWMtM$$!!" is based from a quote "Show me the money!" of Jerry Maguirre movie while a control password can be "atreyu09" from the character Atreyu of The Never Ending Story II movie. The result indicates that 11% out of 146 control passwords are cracked compared to only 4% of 144 mnemonic passwords. However, it is suggested to avoid creating mnemonic phrases that are well-known in the internet.
C. Forensics
When a successful attack is executed on a website through an authenticated, it is important to verify whether the source is from the real account owner or the perpetrator

Related Documents

  • Improved Essays

    Western Governors University A. Security Faults Describe three of the security faults in this scenario that caused a security breach. 1. Some accounts existed before the electronic health record(EHR) was deployed. Important steps were missed during the import of old accounts. I suggest using a clean base line for the brand new EHR system.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Webii review: Pros: • Excellent customer service • Instant exposure • User friendly control panel • Money back guarantee • Reliable Sun and Dell servers Cons: • Cannot create Freehand SQL reports • Burst publication • Overwhelming flood In 1996 Webii starts a new internet service, which carry web hosting industry from the high level of customer service. Then the services have grown to custom web development, website design, marketing services, search engine optimization and domain name registration.…

    • 639 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    On 11/11/15, Dep. E. Reyer made contact with, Rogelior Briseno, in reference to his ex-wife, Fabiola Torrez, opening a Direct TV account under his name. Briseno stated that his children gave him a bill from Direct Tv for service at Torrez address. Brisno stated he contacted Direct TV and was informed the account had been open for several months. Briseno stated he did not have financial loss from the account being opened in his name.…

    • 265 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Shred your documents. Don’t toss bank statements and credit card receipts in the trash. Dispose of them using a cross-cut shredder or shredding service. 2.…

    • 264 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Kavgarri Vs Geovarri

    • 860 Words
    • 4 Pages

    Family History: KaVarri (offender) and GeoVarri (victim) are identical twin sisters. KaVarri has a previous criminal record, hangs out with a rough crowd, and often toys with crime. GeoVarri is the extreme opposite of her twin. She graduated with honors earning her bachelor’s degree in Social Services, and hosts seminars offering help to parents with troubled teenage girls. She is very involved with a close group of church friends, and has never so much has had a traffic ticket.…

    • 860 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1) Network traffic analysis shows that a single host is opening hundreds of SSH sessions to a single host every minute. a. The large number of attempted connections each minute suggests this is an attempted denial of service attack. This type of attack attempts to overload network resources with illegitimate traffic to deny service to legitimate users or business needs. IDS and IPS devices can detect all of this traffic, and the IPS can drop (or have border network devices such as firewalls drop) these packets to prevent the attack from succeeding.…

    • 1074 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Technical Paper – Honeypot IT-548-Q1088 Information Security Submitted by Anudeep Gali Professor: Dr. Derek Holbert Southern New Hampshire University Abstract: Internet is one of the useful resources to the mankind but on the other hand possess so many threats and provides a means of attack for the Intruders. In this project we will be building a secure shell Honeypot and deploy on a public server to research the cyber attacks. Once we deploy the system, we will concentrate on recording all the attempts made by the intruder to enter the information system. We will be able to analyze the most commonly used usernames and passwords and analyze the shell commands used by the intruders to develop remedies of attacks on the original…

    • 1226 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Taniesha Weaknesses

    • 139 Words
    • 1 Pages

    Strengths: Taniesha greets the client in a polite and a professional tone. After verification, Taniesha does a good job acknowledging the client's established account and provides the username on file. Taniesha further explains that the accounts are all linked under the same login. She helpfully provides the email address on the file and makes sure the client has access to reset the password.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    In its fiscal year 2016 assessment report, ICS-CERT listed the most prevalent critical infrastructure vulnerabilities and potential risk that may result from exploitation of these weaknesses. 1. Boundary protection: Weaker boundaries between industrial control systems and enterprise networks makes it difficult to detect unauthorized activity in critical systems. 2. Least functionality: It is important for organizations to minimize and close unused services, ports, protocols, applications and functions that increases vectors for malicious party to gain access to critical systems.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Moderator Rank

    • 531 Words
    • 3 Pages

    What rank are you applying for? Moderator. What is your age? 12 Are you a Boy or Girl? I am a boy.…

    • 531 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    in length. Running Head: Venmo Privacy Concerns Page 2 Jane went to a farmers market with her friend Aska. When Jane went to buy something she realized she didn’t have any cash and all the stands only accepted cash. Aska said she had cash and showed Jane a cool new app she had called Venmo where she could quickly and easily send money to her friends from her phone. Jane installed the app in a couple of steps and was able to reimburse Aska for the items she bought for her.…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Nevertheless, Park doesn't fail to address some more of the reality that we face in the everyday world _ robbery. Basically, we apply every other measure to keep our personal and social life as well as our monetary fund away from strangers in the real world. And we keep ourselves up to date with the passwords while constantly changing it at regular intervals required, especially with the credit cards and social Google accounts. But still hackers and robbers will find the best way out to decrypt our passwords from us through the worst of ways; surely for their own personal benefits and profits. This existing problem is shown along with clarity over the short story that Park presents.…

    • 1975 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Passwords exist for a reason. The second reason this view is nonsense is because someone who is aware that they are being monitored will consciously or unconsciously change their thoughts and behavior just because he/she is aware that they are being recorded. Johann Wolfgang von Goethe a German statesman from the 18th century said “none are more hopelessly enslaved than those who falsely believe they are free”.21…

    • 530 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    A. Overview/Introduction: Clarifies your white paper issue and gives a basic understanding of your connection to the issue (home page) Every year in the U.S, millions of students graduate from high school and go on to find jobs, go to college, or explore their other options. However, every year, 65,000 of those students experience very different lives than those of their peers when they graduate. These students are undocumented. While the 1982 case of Plyler v. Doe in which the Supreme Court ruled that undocumented students would be guaranteed a K-12 education by federal law, there is nothing protecting them after they graduate in many states. As there are about 11.2 million total undocumented immigrants in America as a whole, it is important…

    • 1377 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Strengths: Jeremy greets the client in a polite and a professional tone. He is sure to verify and gain agreement to send the registration email to the client to create the account. He continues on to guide the client to click the link where she will create the username and password. With issues clicking the link, Jeremy offers other options to assist the client with creating the account.…

    • 247 Words
    • 1 Pages
    Improved Essays

Related Topics