Cracking Non-Hashed Passwords
Cracking Non-Hashed Passwords
NON-HASHED
PASSWORDS
Presented by
Gopipriya Chelle
PROBLEM STATEMENT
● This project proposes using two main techniques to crack non-hashed passwords:
1. Brute Force Attack: Trying all possible combinations until the correct password
is found.
2. Dictionary Attack: Using a precompiled list of possible passwords to find
matches.
SOFTWARE & HARDWARE REQUIREMENTS
Software Requirements:
Hardware Requirements:
2. Implementation of
brute force attack using
Python.
3. Implementation of
dictionary attack using
Python.
4. Analysis and
documentation of the
Dictionary
results obtained from the attack’s
attacks. Python
Script
WORKFLOW
ARCHITECTURE
The architecture of the
project involves:
Simple Passwords:
Length: 4-6 characters
Composition: Lowercase letters
Examples: admin, 1234
Moderate Complexity Passwords:
Length: 8-12 characters
Composition: Lowercase letters
Examples: admin123, password123
OUTPUT
BRUTE FORCE ATTACK
OBSERVATIONS:
Observations:
1. What are the main differences between brute force and dictionary attacks?
2. How does the length and complexity of a password affect the time required for a brute
force attack?
3. Why is the comprehensiveness of the dictionary file crucial for the success of a dictionary
attack?
4. What are the key vulnerabilities of non-hashed passwords?
5. How can the implementation of strong hashing mechanisms improve password security?
6. What were the limitations encountered during the project?
7. What future work or improvements do you propose for enhancing password security?
THANK YOU