Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Password Challenge

Objective

The objective of this lab is to put your password hash cracking and text decoding skills to the test. This lab uses various encoding and hashing algorithms that you'll need to figure out.

It is a progressive lab, so the farther down the list the harder the passwords will be to crack. I'd venture to guess that some may even be unbreakable, but just like real life you can expect to run into hashes that cannot be cracked.

I'm asking you to try to get them all, but don't be disappointed if you are unable to.

The idea here it to get you thinking about how to evaluate a hash (or encoded text) and figure out the best tools and methods to crack (or decode) the hashes or encoded text into a string or the plaintext version of the password.

Materials

For the purposes of this lab, you will need the following:
- Time and patients and Google and some luck...just like EC01
- The list of encoded or hashed (or both) passwords below
- A large wordlist, perhaps a GPU, and john the ripper, oclhashcat, or any other hash cracking, text decoding tools you see fit to complete this mission

The Setup
We have been handed a file that contains a bunch of encoded text or hashed passwords and we need get these back into a readable plain text format. Some answers are text strings and others are the passwords that we will need to complete our investigation into an on-going matter at our client. To get credit you need to decipher the items in the list below. Note that each piece of encoded text or hashed password has a "level" next to each one. The level is indicative of the difficulty of the encoding or hash and more difficult decryption are worth more extra credit points. You're also free to use any tools at your disposal and are not limited to the tools we discuss in class or that are in the labs.

Unfortunately, the guy who pulled these from the systems under investigation won the PowerBall and quit. When he left he "air-dropped" a microphone and screamed "Seacrest, out!" We tried to stop him and ask for his notes on the case but he said something about an appointment to buy an island, walked off, and that's the last we heard from him.

Oh, and one more thing, in the event you need it, the user account name for each hash is "depaul" (not in quotes obviously). Also, the salt, unless you can see it in the hash itself, is "hello" (also, obviously not in quotes). Not every hash needs this information, but that's part of your job, to figure this out...

Here's the list:

Q1. (Level 0) - Gsrh lmv rh vzhb, z hrnkov zgyzhs vmxlwv. Gsv mvcg lmv'h zm vmxlwv zh dvoo, xzm blf urtfiv rg lfg?

Q2. (Level 1) - Sio ain cn, yums, lcabn? Hyrn ihy cm uh yhwixy um qyff - nbyh ih ni nby bulxyl koymncihm

Q3. (Level 1) - ZW5vdWdoIGVuY29kaW5nIGFmdGVyIHRoaXMsIG9uIHRvIGhhc2hlcy4gIHlvdSBhcmUgZ2 9pbmcgdG8gbmVlZCBhIGRlY2VudCB3b3JkbGlzdCBhbmQgc29tZSBwb3dlciB0byBnZXQg YWxsIG9mIHRoZSBoYXNoZXMuICBDb25zaWRlciB0aGFuIEkgdXNlZCBOVExNLCBkb21 haW4gY2FjaGVkLCBNRDUodW5peCksIHNoYTI1NmNyeXB0LCBhbmQgc2hhNTEyY3J5c HQgdG8gY3JlYXRlIHRoZSBoYXNoZXMsIHBsdXMgc29tZSBvdGhlciBmb3JtYXRzIHRoY XQgeW91J2xsIG5lZWQgdG8gZmlndXJlIG91dCBhdCB0aGUgZW5k

Q4. (Level 1) - 7a21990fcd3d759941e45c490f143d5f

Q5. (Level 2) - f4e61f523ae3dc73f55cf3227b5e7138

Q6. (Level 1) - $1$1toVu3pw$KasX5rAcEgyU6J3kvFdaM.

Q7. (Level 1) - $5$helloooo$2skkWHNtJoatQzUeigpO6h52zJ4BsGxzBJ0pHhrBPH5

Q8. (Level 2) - $5$helloooo$emr2mn7KebTBsRGoVZMJ53GYN2Yz./We5WkR.Yb9rb.

Q9. (Level 2) - $1$AMGdQZMu$oUpv70n6pzECtBWgkzOCv1

Q10. (Level 1) -
$6$helloooo$T2CRgIHDBgTpWARClHDcfAg1I9llipJfnvyKgjxd1pe5Nb8wVkE9BuWxChaJjg Sz3M3aeqMfdSGQAnTaibOE0/

Q12. (Level 2) -
$6$helloooo$02OtvcXrDaGblWygaXbMuZl7WNMv7SovNrxLxvZpFiu.w1puUuVXWQkpazY EoDCksDpKxTIuV1O96jHC.jdFH1

Q13. (Level 3) - $1$i9Xvdk.J$itPsQ3Aw/tSytR1guqSiC1

Q14. (Level 3) - $P$BROjlbx4FlCrENsKm8B9LKooWoepD21

Q15. (Level 3) - 11f4e97a0609eb99

Q16. (Level 4) - JDEkTHgxTDNKRWwkb0NwMTI4T01PZ1plSVVDVWxhTFo4MQ==

Q17. (Level 4) - c513158d4340c9fd6f85886ffabd4d42edb56a9f3770fdc0107ee5e51433a3d61692d0cdadc15e200 b6a9ef9279d0a2da780fb6d69553fb0ed0a541b88a19b15

Q18. (Level 5) - 1314009918a24a28466e84e31c3b8827

Q19. (Level 5) - 50 52 49 97 101 102 51 51 100 53 49 48 97 53 49 101 57 57 102 49 57 56 99
98 97 48 48 49 99 49 99 54

What you need to turn in

- A list of the hash/encoded text, the plaintext version of the text or password, the type of hash, and the method in which you cracked/deciphered it (i.e. john the ripper using the rockyou.txt wordlist). For the password hashes I'd also be interested, although not required, how long it took to crack the hash. If you're supplying that last piece of info you may need to tell me something about the system you were using, such as CPU/cores or GPU model. This information would probably be best in a spreadsheet of some kind, with columns of question number, original hash/encoded text, decoded hash/text, method, notes/additional info, etc.

- You will get credit for the items you complete, so it would be in your best interest to complete as much as possible and turn this in. Credit will be given based on the difficulty and number of these you complete.

Attachment:- NetworkMiner.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91976174

Have any Question?


Related Questions in Computer Network & Security

Topic is impacts of data breaches the report will divide in

Topic is "Impacts of data breaches". the report will divide in to 5 section which is : "" 1-Abstract: comprehensive overview of the report in 150 to 200 words. 2- Introduction: Describe the topic and its issue in 250 to ...

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Question in a short paragraph explain the transmission of

Question : In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one pa ...

Question in regards to encryption does the public key and

Question : In regards to encryption, does the public key and private key come from the sender or does the receiver already have the private and is given the public key by the sender? The response must be typed, single sp ...

Wireless networks and security assignment - design and

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wirele ...

Consider the following series of paymentsyear 0 20year 1

Consider the following series of payments: Year 0: 20 Year 1: 30 Year 2: 40 Year 3: 10 Year 4: 5 Using an interest rate of 10%: a. What is the present value of this series of payments? b. What is the future value of this ...

Assume that the number of customers who arrive at a water

Assume that the number of customers who arrive at a water ice stand follows the Poisson distribution with an average rate of 6.4 per 30 minutes. What is the probability that more than one customer will arrive during the ...

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As