Incs-745 assignment topic intrusion detection and hacker


Assignment Topic: Intrusion Detection and Hacker Exploits

In this assignment, you are provided with a list of password hashes. You need to identify:

1. Which hash algorithm was used to hash these passwords?

2. Which passwords have been hashed?

Each group is provided with a file containing 500 hash values, one per line.

The n-th group must use file group_n.txt. For instance, group 6 should work only on the hash values in group_6.txt.

Generate a plain-text password file containing all the passwords that you identified, one per line, as follows (password files encoded in formats other than plaintext, such as PDF or Word, will not be accepted, and you will be given 0 points):

123456

12345678

12345

iloveyou

...

Submit the code you wrote to recover the passwords and/or to identify the hash algorithm used to encode the passwords, and write a 1-page report (including references) explaining how the code works, and which hash was used to encode the passwords.

You can also use HashCat or John the Ripper, to recover the passwords. In this case, the report should include a step-by-step description of how you recovered the passwords (the page limit still applies). You cannot use online tools to reverse the hash values.

Include your name and group number in the report, but do not include a title page.

Items to Submit -

1. 1-page report.

2. Text file named group_n_passwords.txt containing the passwords you identified, one per line.

3. Any code you used to complete the assignment, not including the code of HashCat and John the Ripper.

Attachment:- Assignment Files.rar

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Incs-745 assignment topic intrusion detection and hacker
Reference No:- TGS02746617

Expected delivery within 24 Hours