Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please help What is Password Cracking? Password cracking is the process of guess

ID: 3821727 • Letter: P

Question

Please help What is Password Cracking? Password cracking is the process of guessing or recovering a password from stored locations or from data transmission system. It is used to get a password for unauthorized access or to recover a forgotten password. In penetration testing, it is used to check the security of an application. 1. Download 5 password cracking software and create step-by-step instructions. Here is URL you use the download http://resourees.infosecinstitute.com/10-popular-password-cracking-tools/#gref https://fossbytes.com/best-password-cracking-tools-2016-windows-linux-download/

Explanation / Answer

1. RainbowCrack

RainbowCrack is a hash cracker tool that uses a large-scale time-memory trade off process for faster password cracking than traditional brute force tools. Time-memory trade off is a computational process in which all plain text and hash pairs are calculated by using a selected hash algorithm. After computation, results are stored in the rainbow table. This process is very time consuming. But, once the table is ready, it can crack a password must faster than brute force tools.

You also do not need to generate rainbow tablets by yourselves. Developers of RainbowCrack have also generated LM rainbow tables, NTLM rainbow tables, MD5 rainbow tables and Sha1 rainbow tables. Like RainbowCrack, these tables are also available for free. You can download these tables and use for your password cracking processes.

This tool is available for both Windows and Linux systems.

Please read the following link for step by step instruction:

Requirements:-

Windows, Mac OSX, or Linux OS
Admin, or root access

Step 1:-
Download & Install RainbowCrack
Text in bold means it is a terminal command (NT, OSX, or *nix). However, for this step, all commands in bold are for Linux only. The other operating systems use a GUI.

RainbowCrack is the tool that we are going to be using to generate and use rainbow tables.

Download RainbowCrack.
Extract the archive (Windows and Mac users extract via GUI).
tar zxvf <rainbowcrack>
Change to the new directory that has been made from extracting RainbowCrack.
cd <new dir>
Configure the installation.
./configure
Now, compile the source code for installation.
make && sudo make install

Step 2:-
Generate a Rainbow Table and Crack with It
Now, lets generate a table that consists of all the alpha-lowercase and numeral characters. We want these to use the MD5 hash algorithm and be between 4-6 characters. All OS users must open a terminal, or a command prompt and be located in the RainbowCrack working directory.

In your working directory, issue the following command to start table generation.
rtgen md5 loweralpha-numeric 1 7 0 3800 33554432 0
Sort the tables so the processor can access them quicker. The table files will be in the current directory. Run the following command on each of the files in the directory ending in *.rt.
rtsort <*.rt file>
This will take about 6 hours to generate on a single core processor. After you generate the table, let's practice using it on a word.

Let's hash the word "burger" with the MD5 algorithm and then use our tables to crack it. Notice the b is in lowercase. Here is our result: 6e69685d22c94ffd42ccd7e70e246bd9
Crack the hash with the following command, along with the path to your file.
rcrack <path-to-rainbow-table.rt> -h 6e69685d22c94ffd42ccd7e70e246bd9
It will return your hash. You'll see it is a lot faster than if you were try to bruteforce the six character hash.


2. Cain and Abel

Cain and Abel is a well-known password cracking tool that is capable of handling a variety of tasks. The most notable thing is that the tool is only available for Windows platforms. It can work as sniffer in the network, cracking encrypted passwords using the dictionary attack, recording VoIP conversations, brute force attacks, cryptanalysis attacks, revealing password boxes, uncovering cached passwords, decoding scrambled passwords, and analyzing routing protocols.

Cain and Abel does not exploit any vulnerability or bugs. It only covers security weakness of protocols to grab the password. This tool was developed for network administrators, security professionals, forensics staff, and penetration testers.

Please click on the following link for step by step instruction:-

Step 1:
Please turn off the windows firewall or any other third party firewall so that all the packets are captured efficiently.

Step 2:
Open Cain and Abel tool

Step 3:
Goto -> Sniffer Tab and click Configure in the main menu to configure your packet listening adapter.

Step 4:
Select the appropriate network adapter for your network that you want to sniff the packets for plain-text passwords. And Click Ok.

Step 5:
Click the Green Adapter icon as shown below. This means that you just configured the adapter and now you are turning it ON.

Step 6:
Now select the APR tab below as shown and now first click on the right side upper pane area. When you click that area the blue plus (“+”) icon will get enabled. Press that blue plus (“+”) icon.

Step 7:
This is very interesting step. Now we need to select the router`s IP address and click ok. This means that we want to listen to every packet that is sent to router. If we select any other IP address in our LAN network then we can listen to only that particular HOST on the network. Since the router responds to all the request of HOSTS connected in a LAN. Thus we can listen to all the HOSTs.

Step 8:
Now click the Yellow Circle icon as shown. This means that we are starting ARP poisoning.

Step 9:
We can see that in the upper right panel there is an IP address of our router and when we press that Yellow Circle icon (button), it performs ARP poisoning.

Step 10:
Now click the password tab which is at the bottom. We can see that we are getting passwords of HTTP i.e. plain text session in our LAN network.

3.John the Ripper:

John the Ripper is another well-known free open source password cracking tool for Linux, Unix and Mac OS X. A Windows version is also available. This tool can detect weak passwords. A pro version of the tool is also available, which offers better features and native packages for target operating systems. You can also download Openwall GNU/*/Linux that comes with John the Ripper.

Please click on the following link for step by step instruction:

Step 1: Get John the Ripper. For this you need the jumbo version which you can find and download here. Make sure to select the jumbo version, which is a community enhanced version of John the Ripper. Download it and extract it to a folder of your choice.

Step 2: Generate the hash-file. First open a terminal and navigate to the folder you extracted your files to and in there to the folder „run“. For me this was

cd john-1.7.9-jumbo-7/run/

Now before we can use the program we need to make a hash-file out of the file we want to crack. For this we have different applications in the run folder. The file I want to crack is a pdf file, so I use pdf2john.

./pdf2john ‚/home/urban/Schreibtisch/protected.pdf‘

The output for me was:

/home/user/protected.pdf:$pdf$Standard*92386475aa6b974ef136c049b1843629e44af33515d1c979527d690aa14bb99f*98e8cf124f0a5ea93434b6d880f9a0f700000000000000000000000000000000*16*33380181f788f556cf69ef882c35f00e*1*1*0*1*4*128*-1028*3*2
Open gedit or another text editor and copy everything after the „:“ in there and save it.

Step 3: Next we want to brute-force the hash-file. For this first run the program by typing

./john

4. OphCrack:

OphCrack is a free rainbow-table based password cracking tool for Windows. It is the most popular Windows password cracking tool, but can also be used on Linux and Mac systems. It cracks LM and NTLM hashes. For cracking Windows XP, Vista and Windows 7, free rainbow-tables are also available.

A live CD of OphCrack is also available to simplify the cracking. One can use the Live CD of OphCrack to crack Windows-based passwords. This tool is available for free.

Download OphCrack here: http://ophcrack.sourceforge.net/

Download free and premium rainbow tables for OphCrack here: http://ophcrack.sourceforge.net/tables.php

Please click on the following link for step by step instruction:


Step 1:
Download :
Go to Ophcrack's website and click on the "Download Ophcrack LiveCD" link, then select the link for "Ophcrack XP LiveCD" if you're using Windows XP and download it.

Then go to the Tables section of Ophcrack's site and download the "Vista Free" table, and if you want, the "XP Free Fast" table, although this is optional. Any tables that don't have the word "free" in the title are paid tables.

Step 2:
Installing to CD or DVD :
If you want to install Ophcrack to a USB flash drive instead of a CD, then skip this step.

To install Ophcrack on a CD/DVD, you need to mount the .ISO image you downloaded in the previous step onto the disk. On some versions of Windows, when you double-click the downloaded file, the Windows Disk Image Burner will open. Just select the drive you want to burn to and click "Burn".
If your operating system doesn't have a built-in .ISO burner, there are plenty available as freeware on the Internet. Just Google it and look at the reviews to choose the best one.
Now, unless you want to install Ophcrack to a USB drive or hard drive, skip ahead to Step 4.

Step 3:
Installing to USB Flash Drive or Hard Drive :
There are several ways of doing this, but I'm just going to cover the simplest (in my opinion).

The fist step is to download the Universal USB Installer from Pen Drive Linux. After it's downloaded, run it and agree to the license agreement. Because Ophcrack has been update more recently than the installer, you will need to select "Try Unlisted Linux ISO (New Syslinux)" in the first box. Next, browse to your file, select your USB drive letter and click "Create". The wizard should do the rest for you, with the occasional "OK".

Step 4:
Adding Tables:
To add the Vista tables, you must create a folder called "vista_free" in the Tables folder on your CD, DVD, or USB drive. Then extract the Vista free tables .zip file that you downloaded earlier into this. You can do the same with "XP_free_fast" and the corresponding tables.

Step 5:
Using Ophcrack
To use Ophcrack, you should boot from your CD or USB drive from the BIOS menu. If all goes well, then Ophcrack should open after a short period of time, and you just click "Crack" to crack the password. However, there can be some problems, the most common being a "Tables not found" or "No tables found" error. To solve this, you open the Linux terminal in the applications menu and type the following (each line is a new line and spaces must be included as they are here):

su root
root
mkdir /mnt/usbkey
ls /mnt
mount /dev/sdb /mnt/usbkey
ls /mnt/usbkey
./launch.sh

Hopefully now, Ophcrack should start as intended.


5.Aircrack-NG:

It is a WiFi password cracking tool that can crack WEP or WPA passwords. It analyzes wireless encrypted packets and then tries to crack passwords via its cracking algorithm. It uses the FMS attack along with other useful attack techniques for cracking password. It is available for Linux and Windows systems. A live CD of Aircrack is also available.

Please click on the following link for step by step instruction:

Step 1:
Iwconfig:
Before we get started with aircrcak-ng, we need to make certain that BackTrack recognizes your wireless adapter. We can do this within any Linux system by typing:

bt > iwconfig

you would see that BackTrack recognizes your USB wireless card, and it tells you that it's capable of 802.11bgn, that the ESSID is off, that the mode is managed, etc.

Okay, now you're ready to start using aircrack-ng

Step 2:
Airmon-Ng:
The first tool we will look at and need in nearly ever WiFi hack is airmon-ng, which converts our wireless card into a promiscuous mode wireless card. Yes, that means that our wireless card will hookup with anyone!

Well, that's almost correct. When our network card is in promiscuous mode, it means that it can see and receive all network traffic. Generally, network cards will only receive packets intended for them (as determined by the MAC address of the NIC), but with airmon-ng, it will receive all wireless traffic intended for us or not.

We can start this tool by typing airmon-ng, the action (start/stop), and then the interface (mon0):

bt > airmon-ng start wlan1

Step 3:

Airodump-Ng:
The next tool in the aircrack-ng suite that we will need is airodump-ng, which enables us to capture packets of our specification. It's particularly useful in password cracking.

We activate this tool by typing the airodump-ng command and the renamed monitor interface (mon0):

bt >airodump-ng mon0

you will see there in your monitor, airodump-ng displays all of the APs (access points) within range with their BSSID (MAC address), their power, the number of beacon frames, the number of data packets, the channel, the speed, the encryption method, the type of cipher used, the authentication method used, and finally, the ESSID.

For our purposes of hacking WiFi, the most important fields will be the BSSID and the channel.


Step 4:

Aircrack-Ng:
Aircrack-ng is the primary application with the aircrack-ng suite, which is used for password cracking. It's capable of using statistical techniques to crack WEP and dictionary cracks for WPA and WPA2 after capturing the WPA handshake.

Step 5:
Aireplay-Ng:
Aireplay-ng is another powerful tool in our aircrack-ng arsenal, and it can be used to generate or accelerate traffic on the AP. This can be especially useful in attacks like a deauth attack that bumps everyone off the access point, WEP and WPA2 password attacks, as well as ARP injection and replay attacks.

Aireplay-ng can obtain packets from two sources:

1-A live stream of packets, or
2-A pre-captured pcap file
The pcap file is the standard file type associated with packet capture tools like libpcap and winpcap. If you've ever used Wireshark, you've most likely worked with pcap files.

Step 6:

Airdecap-Ng:
Airdecap-ng enables us to decrypt wireless traffic once we have cracked the key. In other words, once we have the key on the wireless access point, not only can we use the bandwidth on the access point, but with airdecap-ng we can decrypt everyone's traffic on the AP and watch everything they're doing (the key is used for both access and for encryption).

Step 7:

Airtun-Ng:
Airtun-ng is a virtual tunnel interface creator. We can use airtun-ng to set up an IDS on the wireless traffic to detect malicious or other traffic on the wireless access point. So, if we're looking to get an alert of a particular type of traffic, we can use airtun-ng to set up a virtual tunnel that connects to an IDS like Snort to send us alerts.

Step 8:

Airolib-Ng
Airolib-ng stores or manages ESSID's (the name of the access point) and password lists that will help speed up WPA/WPA2 password cracking.

Step 9

Airbase-Ng:
Airbase-ng enables us to turn our laptop and wireless card into an AP. This can be especially useful when doing a rogue access point or evil twin attacks. Basically, airbase-ng allows us to attack the clients, rather than the AP, and encourages the clients to associate with us rather than the real AP.