Password Cracking
Password Cracking
1
Lab Exercise 1 – Password Cracking
Created by: Eng. Mohamed El-Sobki
Introduction
Passwords have long been
regarded as the primary
means to safeguard
valuable data against
unauthorized access. They
are user-friendly and
straightforward, providing
a basic level of defense How Hackers Obtain Cracked Passwords:
against most hacking
attempts. In the realm of password cracking, most attackers
adhere to a simple rule: the easier, the better.
However, with the Their primary goal is to find the simplest, most
advancement of cost-effective, and stealthiest means to crack your
technology, the password.
conventional approach of
relying solely on passwords Regrettably, attackers have at their disposal a
for security appears to be variety of tools designed for legitimate purposes
gradually losing its like password recovery and security testing, but
effectiveness. Weak or some individuals misuse these tools for malicious
easily guessable passwords intent. Here's a brief overview of some commonly
can be exploited, and even used password cracking software:
strong ones are not
immune to determined • Hashcat: Widely recognized as one of the
hacker attacks. fastest password-cracking tools, Hashcat
supports multiple cracking methods.
So, how can you enhance Notably, it does not store cracked passwords
your protection against on its servers and is freely available.
password cracking? In this • John the Ripper: John the Ripper is an open-
article, we delve into the source, multi-platform password cracking
increasingly critical realm tool that's completely free. It boasts
of password cracking in compatibility with hundreds of hash and
cybersecurity and offer cipher types, rendering it highly versatile.
valuable tips on preventing • CrackStation: In contrast to the previously
password breaches. mentioned software, CrackStation is a web-
Continue reading to based cracker without a standalone
discover strategies for program. It is capable of handling various
rendering cracked protocols but is limited to non-salted hashes
passwords a thing of the without additional random strings.
past.
2
Lab Exercise 1 – Password Cracking
Created by: Eng. Mohamed El-Sobki
Types of Password Cracking
3
Lab Exercise 1 – Password Cracking
Created by: Eng. Mohamed El-Sobki
Types of Password Cracking
2. Social engineering encompasses a range of malicious activities
that manipulate human interactions through psychological
tactics. In social engineering attacks, hackers exploit human
psychology to deceive victims and obtain valuable sensitive
information. These attacks are often well-planned and may
involve extensive research on the victims. Common forms of
social engineering attacks include:
3. Hash-Based Attacks
Hash-based attacks pose a significant threat as attackers can
target user/password databases, even offline. The two primary
types of hash-based attacks are:
4
Lab Exercise 1 – Password Cracking
Created by: Eng. Mohamed El-Sobki
Linux Password Cracking Lab:
The shadow file contains the actual user encrypted password (hash) as shown
below the shadow file structure.
1. we can show the content of that file using the following command:
# cat /etc/shadow
5
Lab Exercise 1 – Password Cracking
Created by: Eng. Mohamed El-Sobki
Continued:
4. Install hashid tool to Check the different types of hashes in the shadow file.
7. Start use hashcat tool based on hashes type The core syntax of hashcat is as
follows:
6
Lab Exercise 1 – Password Cracking
Created by: Eng. Mohamed El-Sobki
Continued:
8. Hashing Algorithms: The modes can be found using hashcat ‐‐help (note:
hashcat cannot attack multiple hash types in a single session but there are other
tools that can).
For example, MD5 would be -m 0, SHA1 would be -m 100 and so on.
9. Attack Modes: This is the type of password attack you’d like to carry out.
Dictionary (referred to as ‘Straight’ in hashcat) is attack mode 0.
7
Lab Exercise 1 – Password Cracking
Created by: Eng. Mohamed El-Sobki
Safeguard Your Passwords from Cracking
• Longer Passwords: Longer passwords are required, making the brute force
mechanism tougher to implement. Longer passwords and passphrases have
been demonstrated to boost security significantly. However, it is still critical to
avoid lengthier passwords that have previously been hacked or that feature
often in cracking dictionaries.
• No Personal Details: This password policy encourages users to establish
passwords that do not contain personal information. As previously said, most
users create passwords utilizing personal information such as hobbies,
nicknames, pet or family member names, etc. If a hacker has access to
personal information about a specific user (for example, via social media),
they will test password combinations based on this knowledge.
• Different Passwords for Different Accounts: Password regulations should
compel users to distinguish between security and convenience. Users should
be prohibited from using the same passwords for all services. Password
sharing between users – including those who work in the same department or
use the same equipment – should be avoided. A single breached password
doesn't affect your other accounts with this policy.
• Use Passphrases: Some password regulations necessitate the creation of a
passphrase rather than a password. While passes serve the same objective,
their length makes them more difficult to break. In addition to letters, a good
pass should include numbers and symbols. Passwords may be easier for users
to remember than passphrases. However, the latter is much more breach-
resistant.
• Two-Factor Authentication: Two-factor authentication(2FA) can help secure an
online account or even a smartphone. 2FA does this by asking the user to
provide two forms of information—a password or personal identification
number (PIN), a code texted to the user's smartphone, or a fingerprint—
before accessing whatever is secured. This helps discourage unauthorized
entries to an account without the original user's permission.
By following these guidelines, you can significantly reduce the risk of your
passwords being cracked.
8
Lab Exercise 1 – Password Cracking
Created by: Eng. Mohamed El-Sobki