SlideShare a Scribd company logo
1 of 15
Password
Cracking
By
Sagar Verma
1412213082
Contents
• Introduction
• What is password
• How passwords are stored
• Password cracker types
• Factors on which password cracking depends
• Incidents
• Gmail Cracking
• Conclusion
Introduction
• Password cracking is a term used to describe the penetration of a network,
system, or resource with or without the use of tools to unlock a resource
that has been secured with a password
• It is one of the oldest hacking arts. Every system must store passwords
somewhere in order to authenticate users. However, in order to protect
these passwords from being stolen, they are encrypted.
• Password cracking is the art of decrypting the passwords in order to
recover them.
What is Password
• String of characters for authentication and log on
computer, web application , software, Files , network
, Mobile phones, and your life 
• Comprises:
[a-zA-z, 0-9, symbols , space]
How Passwords are Stored
In order to understand how to compromise passwords, it is first necessary to
understand how passwords are stored on typical systems.
• Unix Password File- It stores the hashed value of passwords in the password file instead
of the actual passwords. Hashed passwords were originally stored in publicly accessible
file /etc/passwd.
• Windows Password File- The password file for Windows, known as the Security Accounts
Manager (SAM) file, is located in
C:windowssystem32configsam
Password Cracker Types
Password crackers use two primary methods to identify correct passwords:
• Brute Force Attack
• Dictionary Attack
There are some more methods like-
• Malware
• Social Engineering
Dictionary Attack
• When conducting a dictionary search, a password
cracker searches each word in the dictionary (a file
containing most commonly used passwords) for the
correct password.
• Password dictionaries exist for a variety of topics and
combinations of topics, like politics, movies, and
music groups.
Brute Force Attack
When a password cracker
uses a brute-force tool, it
tests all the possible
combinations of a
predetermined length until it
finds the right combination
accepted by the computer
system.
Phishing
• There's an easy way to hack:
ask the user for his or her
password. A phishing email
leads the unsuspecting
reader to a faked online
banking, payment or other
site in order to login and put
right some terrible problem
with their security.
• Why bother going to the
trouble of cracking the
password when the user will
happily give it you anyway?
Some more attacks..
Malware
A key logger or screen scraper can be installed by malware which records
everything you type or takes screen shots during a login process, and then forwards
a copy of this file to hacker central.
Social Engineering
Social engineering takes the whole ‘ask the user’ concept outside of the inbox that
phishing tends to stick with and into the real world.
A favourite of the social engineer is to telephone an office posing as an IT security
tech guy and simply ask for the network access password. You’d be amazed how
often this works.
Password Cracking Depends on
• Attacker's strengths
• Attacker's computing resources
• Attacker's mode of access [physical or online]
• Strength of the passwords
• How often you change your passwords?
• How close are the old and new passwords?
• How long is your password?
• Have you used every possible combination: alphabets, numbers and special characters?
• How common are your letters, words, numbers or combination?
• Have you used strings followed by numbers or vice versa, instead of mixing them randomly?
Incidents
• On July 16, 1998, CERT reported an incident where an attacker had found
186,126 encrypted passwords. By the time they were discovered, they had
already cracked 47,642 passwords
• On July 18, 2011, Microsoft Hotmail banned the password: "123456”
• In July 2015, a group calling itself "The Impact Team" stole the user data of
Ashley Madison.
• As of 2017, a single GeForce GTX 1080 GPU is capable of testing 25 billion MD5
encryption per second.
Gmail Cracking
• By using Dictionary Attack we can easily crack Gmail
Account.
• If you try to use the Brute force technique to hack any
Gmail or Hotmail accounts then it will block your IP
and also account for some specific number of
attempts.
• SMTP server is a simple server with very fewer
functionalities, hence it is easy to perform attacks on
SMTP server.
Conclusion
Password Cracking is a good way of accessing information or getting
some useful sources for any organisation, for people. But now a days
many of the password cracking techniques are used for the wrong
purposes. In case you think you're safe from the attentions of such
criminal types, or think they'd never be able to guess your password,
perhaps you might be interested to learn just how wrong you are.
Password Cracking

More Related Content

What's hot

Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Password Cracking
Password Cracking Password Cracking
Password Cracking Sina Manavi
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptxIkramSabir4
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)securityEnrico Zimuel
 

What's hot (20)

Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Network security
Network securityNetwork security
Network security
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Software security
Software securitySoftware security
Software security
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 

Similar to Password Cracking

Cyber Security(Password Cracking Presentation).pptx
Cyber Security(Password Cracking Presentation).pptxCyber Security(Password Cracking Presentation).pptx
Cyber Security(Password Cracking Presentation).pptxVASUOFFICIAL
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPrasad Pawar
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
Web defacement
Web defacementWeb defacement
Web defacementstudent
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
Login cat tekmonks - v3
Login cat   tekmonks - v3Login cat   tekmonks - v3
Login cat tekmonks - v3TEKMONKS
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITYSupanShah2
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 

Similar to Password Cracking (20)

How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Cyber Security(Password Cracking Presentation).pptx
Cyber Security(Password Cracking Presentation).pptxCyber Security(Password Cracking Presentation).pptx
Cyber Security(Password Cracking Presentation).pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Web defacement
Web defacementWeb defacement
Web defacement
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Login cat tekmonks - v3
Login cat   tekmonks - v3Login cat   tekmonks - v3
Login cat tekmonks - v3
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITY
 
Password hacking
Password hackingPassword hacking
Password hacking
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Password Cracking

  • 2. Contents • Introduction • What is password • How passwords are stored • Password cracker types • Factors on which password cracking depends • Incidents • Gmail Cracking • Conclusion
  • 3. Introduction • Password cracking is a term used to describe the penetration of a network, system, or resource with or without the use of tools to unlock a resource that has been secured with a password • It is one of the oldest hacking arts. Every system must store passwords somewhere in order to authenticate users. However, in order to protect these passwords from being stolen, they are encrypted. • Password cracking is the art of decrypting the passwords in order to recover them.
  • 4. What is Password • String of characters for authentication and log on computer, web application , software, Files , network , Mobile phones, and your life  • Comprises: [a-zA-z, 0-9, symbols , space]
  • 5. How Passwords are Stored In order to understand how to compromise passwords, it is first necessary to understand how passwords are stored on typical systems. • Unix Password File- It stores the hashed value of passwords in the password file instead of the actual passwords. Hashed passwords were originally stored in publicly accessible file /etc/passwd. • Windows Password File- The password file for Windows, known as the Security Accounts Manager (SAM) file, is located in C:windowssystem32configsam
  • 6. Password Cracker Types Password crackers use two primary methods to identify correct passwords: • Brute Force Attack • Dictionary Attack There are some more methods like- • Malware • Social Engineering
  • 7. Dictionary Attack • When conducting a dictionary search, a password cracker searches each word in the dictionary (a file containing most commonly used passwords) for the correct password. • Password dictionaries exist for a variety of topics and combinations of topics, like politics, movies, and music groups.
  • 8. Brute Force Attack When a password cracker uses a brute-force tool, it tests all the possible combinations of a predetermined length until it finds the right combination accepted by the computer system.
  • 9. Phishing • There's an easy way to hack: ask the user for his or her password. A phishing email leads the unsuspecting reader to a faked online banking, payment or other site in order to login and put right some terrible problem with their security. • Why bother going to the trouble of cracking the password when the user will happily give it you anyway?
  • 10. Some more attacks.. Malware A key logger or screen scraper can be installed by malware which records everything you type or takes screen shots during a login process, and then forwards a copy of this file to hacker central. Social Engineering Social engineering takes the whole ‘ask the user’ concept outside of the inbox that phishing tends to stick with and into the real world. A favourite of the social engineer is to telephone an office posing as an IT security tech guy and simply ask for the network access password. You’d be amazed how often this works.
  • 11. Password Cracking Depends on • Attacker's strengths • Attacker's computing resources • Attacker's mode of access [physical or online] • Strength of the passwords • How often you change your passwords? • How close are the old and new passwords? • How long is your password? • Have you used every possible combination: alphabets, numbers and special characters? • How common are your letters, words, numbers or combination? • Have you used strings followed by numbers or vice versa, instead of mixing them randomly?
  • 12. Incidents • On July 16, 1998, CERT reported an incident where an attacker had found 186,126 encrypted passwords. By the time they were discovered, they had already cracked 47,642 passwords • On July 18, 2011, Microsoft Hotmail banned the password: "123456” • In July 2015, a group calling itself "The Impact Team" stole the user data of Ashley Madison. • As of 2017, a single GeForce GTX 1080 GPU is capable of testing 25 billion MD5 encryption per second.
  • 13. Gmail Cracking • By using Dictionary Attack we can easily crack Gmail Account. • If you try to use the Brute force technique to hack any Gmail or Hotmail accounts then it will block your IP and also account for some specific number of attempts. • SMTP server is a simple server with very fewer functionalities, hence it is easy to perform attacks on SMTP server.
  • 14. Conclusion Password Cracking is a good way of accessing information or getting some useful sources for any organisation, for people. But now a days many of the password cracking techniques are used for the wrong purposes. In case you think you're safe from the attentions of such criminal types, or think they'd never be able to guess your password, perhaps you might be interested to learn just how wrong you are.