The document summarizes a cyber security lab assignment where the student was tasked with cracking 3 encrypted files - a RAR file encrypted with their student roll number as the password, a ZIP file encrypted with their first name as the password, and another ZIP file encrypted with their last name as the password. The student provides reports on their attempts to crack each file using John the Ripper and lists of possible passwords.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
23 views9 pages
Asim 015 Lab5
The document summarizes a cyber security lab assignment where the student was tasked with cracking 3 encrypted files - a RAR file encrypted with their student roll number as the password, a ZIP file encrypted with their first name as the password, and another ZIP file encrypted with their last name as the password. The student provides reports on their attempts to crack each file using John the Ripper and lists of possible passwords.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9
Foundation University
School of Science and Technology
Intro to Cyber Security Lab 5
Department of Engineering Technology
Name: Asim Ali Course: Intro to Cyber Security Lab 5 Department: BS IET 3 Roll No: 015 Lab Task: - Crack 3 different files (1 rar & 2 zip files). - Rar file should be encrypted with your rollno/regno as password. - 1 st Zip file should be encrypted with your first name as password. - 2 nd Zip file should be encrypted with your last name as password. - Password in any case should not exceed the length of 5 characters. Use only firs 5 characters if it exceeds. - Provide restriction while cracking in john to only 5-character length checking. - Provide list of possible passwords to john containing at least 30 different entries. - Given list should include your real passwords along with other random words.