Chapter_8_Password-Cracking

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Password cracking

is the process of using an application program to identify an unknown or forgotten password to a computer or network resource.

2
New cards

password cracker

recovers passwords using various techniques.

The process can involve comparing a list of words to guess passwords or the use of an algorithm to repeatedly guess the password.

3
New cards

Hashes

are mathematical functions that change arbitrary-length inputs into an encrypted fixed length output.

4
New cards

A password cracker may also be able to identify encrypted passwords.

True or False

True

5
New cards

Brute force

This attack runs through combinations of characters of a predetermined length until it finds the combination that matches the password.

6
New cards

Dictionary search

Here, a password cracker searches each word in the ____________ for the correct password. Password ____________ exist for a variety of topics and combinations of topics, including politics, movies and music groups

7
New cards

Phishing

These attacks are used to gain access to user passwords without the use of a password cracking tool. Instead, a user is fooled into clicking on an email attachment.

8
New cards

Malware

Similar to phishing, using _________ is another method of gaining unauthored access to passwords without the use of a password cracking tool

_____ such as keyloggers, which track keystrokes, or screen scrapers, which take screenshots, are used instead.

9
New cards

Rainbow attack

. This approach involves using different words from the original password in order to generate other possible passwords. Malicious actors can keep a list called a rainbow table with them.

10
New cards

Guessing

An attacker may be able to guess a password without the use of tools. If the threat actor has enough information about the victim or the victim is using a common enough password, they may be able to come up with the correct characters.

11
New cards

hybrid attack methodologies

Some password cracking programs may use ___________________________ where they search for combinations of dictionary entries and numbers or special characters.

12
New cards

Cain and Abel

This password recovery software can recover passwords for Microsoft Windows user accounts and Microsoft Access passwords.

uses a graphical user interface, making it more user-friendly than comparable tools. The software uses dictionary lists and brute-force attack methods.

13
New cards

Ophcrack

This password cracker uses rainbow tables and brute-force attacks to crack passwords. It runs on Windows, macOS and Linux.

14
New cards

John the Ripper

This tool uses a dictionary list approach and is available primarily for macOS and Linux systems.

15
New cards

Be at least 12 characters long

The shorter a password is, the easier and faster it will be cracked.

16
New cards

Combine letters and a variety of characters

Using numbers and special characters, such as periods and commas, increases the number of possible combinations.

17
New cards

Avoid reusing a password

If a password is cracked, then a person with malicious intent could use that same password to easily access other password-protected accounts the victim owns.

18
New cards

Pay attention to password strength indicators

Some password-protected systems include a password strength meter, which is a scale that tells users when they have created a strong password.