0% found this document useful (0 votes)
23 views9 pages

Asim 015 Lab5

The document summarizes a cyber security lab assignment where the student was tasked with cracking 3 encrypted files - a RAR file encrypted with their student roll number as the password, a ZIP file encrypted with their first name as the password, and another ZIP file encrypted with their last name as the password. The student provides reports on their attempts to crack each file using John the Ripper and lists of possible passwords.

Uploaded by

asimabbasi9199
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views9 pages

Asim 015 Lab5

The document summarizes a cyber security lab assignment where the student was tasked with cracking 3 encrypted files - a RAR file encrypted with their student roll number as the password, a ZIP file encrypted with their first name as the password, and another ZIP file encrypted with their last name as the password. The student provides reports on their attempts to crack each file using John the Ripper and lists of possible passwords.

Uploaded by

asimabbasi9199
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Foundation University

School of Science and Technology

Intro to Cyber Security Lab 5

Department of Engineering Technology


Name: Asim Ali
Course: Intro to Cyber Security Lab 5
Department: BS IET 3
Roll No: 015
Lab Task:
- Crack 3 different files (1 rar & 2 zip files).
- Rar file should be encrypted with your rollno/regno as password.
- 1 st Zip file should be encrypted with your first name as password.
- 2 nd Zip file should be encrypted with your last name as password.
- Password in any case should not exceed the length of 5 characters. Use only firs
5 characters if it exceeds.
- Provide restriction while cracking in john to only 5-character length checking.
- Provide list of possible passwords to john containing at least 30 different
entries.
- Given list should include your real passwords along with other random words.

 Attack for 1st Zip:


Opening hash.txt file:

Opening word.txt file:


Method:
 Attack for 2nd Zip:

Opening hash.txt file:


Opening word.txt file:

Method:
 Attack for 3rd RAR:

Opening hash.txt file:


Opening word.txt file:

Encrypted File:
Method:

You might also like