英国代写code范文精选:“密码破解器”,这篇论文主要讲述了大多数入侵登录界面的过程。本实验的目标是创建一个C语言程序,读取一个名为jfd_passwords.txt的伪密码文件,并尝试猜测其中的加密密码。
Requirement One of the first steps in most intrusion attempts is to try to guess user logins and passwords. Your objective in this lab assignment is to create a C language program (convince me you want to do this in a language other than C) to read a pseudo-password file named jfd_passwords.txt and attempt to guess the encrypted passwords within. You may work on this assignment in pairs. You must write the program in C. You should use the crypt(3) library function to encrypt your password guesses. You should extract the salt string from the pseudo-password file entry. You may use any technique you wish to guess passwords (see suggestions below). The Linux system dictionary file is (usually) in /usr/share/dict/words (or linux.words). It has 480K words in it, including numbers, hyphenated words, and a host of very strange ones. The system dictionary on Mac OS X 10.11 is also in /usr/share/dict/words. It has 235K words, however. On a Mac OS X system there is also a /usr/share/dict/web2a dictionary that include hyphenated words, and a /usr/share/dict/propernames file that contains 1323 proper names, all one per line. I’ve also got several lists of common and pilfered passwords that I’ll post on the Google Classroom page. The jfd_passwords.txt file is in the Google Classroom, attached to this problem set. The format of the entries in the file matches that of the/etc/passwd file as found in the passwd(5) man page on your local Linux box. Copy this file to your own computer or to one of the computers in the Crash and Burn lab to work on it. DO NOT execute your password program on euclid. DO NOT use the system password file as a test file. (It doesn’t have any passwords in it anyway!) DO NOT execute your password program on any of the ITS lab machines, or on KnoxAnyWare. If you’ve installed Kali Linux on your machine (under VirtualBox), then that’s a great place to create and test your program. You can easily move files back and forth via your Google Drive (just login to my.knox.edu using the Ice Weasel web browser on Kali Linux). If you don’t want to use Kali Linux, you can use the SEED version of Ubuntu, or you can just login to euclid.lab.knet.edu and do your work there (except for that final testing bit from above). If you have a Mac, just open up the terminal window and work there. If you have a Windoze machine, I’d suggest downloading Cygwin and working in there. In addition to your program and the documentation described below, you should turn in: 1.the list of the passwords you recovered 2.the number of tries it took to recover each password 3.the time it took your program to recover each password. Your grade for this problem set will depend on how many passwords you crack. The more the better!! HINTS AND SUGGESTIONS: I’d try a straight dictionary attack first, using one of the dictionary files mentioned above. Then try some of the common passwords from the files on the Google Drive. Then try dictionary words backwards. Then try replacing certain characters with digits O = 0, I = 1, E = 3, etc. The above attacks should get you several passwords; then be creative! Be aware that your program might execute for a loooooooonnnnnngggggg time, (like for 12 to 24 hours or more). You must print each password you find (including the original line from the password file) to an output file along with a timestamp. You should consider executing your program in the background. To do this from the command line, do something like: $ time ./mypasswordCracker <dictionary file> <password file> & You must time how long your password program works and print the elapsed time at the end. (you can do this using the time(1) command line function in Linux as above). The plaintext passwords used to create the jfd_passwords.txt file have the following characteristics: 1.They are composed of only the characters [a-zA-Z0-9*_] 2.The password lengths are between 3 and 12 characters, inclusive. (I’m being nice.) 3.At least some of the passwords are dictionary words. (Nice again.) To help you understand the use of the crypt() function , here’s a simple example that works on MacOS X systems and (with slight modification) on Linux systems: Example 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 /* * Short program to test the crypt(3) library function. * note that on a Linux system you must include * crypt.h and link with -lcrypt * this is not necessary on Mac OS X */ #include <stdio.h> #include <stdlib.h> #include <unistd.h> int main(int argc, char *argv[]) { char *salt; char *password; if (argc < 3) { fprintf(stderr, "usage: %s <salt> <password>\n", argv[0]); exit(1); } salt = argv[1]; password = argv[2]; printf("Encrypted password is %s\n", crypt(password, salt)); return 0; } 51Due作为专业的留学教育辅导机构,专业辅导语言学论文代写、硕士paper代写、英国matlab作业代写,自2004年至今,坚持以学生为中心,全天候服务,为海外留学生完成了数万篇assignment代写、essay代写、report代写、dissertation代写等论文,以优质的英国代写服务赢得留学生的信赖,如有英国代写code需求或者英国it课程补习需求,欢迎咨询QQ800020041哦。 51Due网站原创范文除特殊说明外一切图文著作权归51Due所有,未经51Due官方授权谢绝任何用途转载或刊发于媒体。如发生侵犯著作权现象,51Due保留一切法律追诉权。-C
0 Comments
Leave a Reply. |
Author51Due是一家以海外中国留学生创业团队为主导,总部设在美国纽约的留学教育咨询机构,同时也是海外拥有强大综合教员实力的论文代写机构。主要业务包括海外课业咨询,提供Essay代写与辅导,Paper代写与辅导,Report代写与辅导,Assignment代写与辅导,论文代写,论文修改,计算机编程代写,同时涵盖了Personal Statement代写等留学文书以及转学申请文书的代写,海外求学咨询与新留学生辅导等各个留学环节的专业咨询。 ArchivesCategories
全部
|