[go: up one dir, main page]

0% found this document useful (0 votes)
20 views4 pages

Create and Crack Password Hashes

The document discusses password hashing and cracking, explaining how hashing converts passwords into secure, fixed-length strings that cannot be reversed. It outlines common hash functions like MD5, SHA-1, SHA-256, and Bcrypt, emphasizing their security levels. Additionally, it describes methods of cracking passwords, including brute force and dictionary attacks, and highlights the vulnerability of weak passwords to these techniques.

Uploaded by

maydahatiq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views4 pages

Create and Crack Password Hashes

The document discusses password hashing and cracking, explaining how hashing converts passwords into secure, fixed-length strings that cannot be reversed. It outlines common hash functions like MD5, SHA-1, SHA-256, and Bcrypt, emphasizing their security levels. Additionally, it describes methods of cracking passwords, including brute force and dictionary attacks, and highlights the vulnerability of weak passwords to these techniques.

Uploaded by

maydahatiq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Cyber Security Assignment

Participant's Name: Maida


Participant ID: 25

Supervisor
Mam Kinza Noor

Topic Name: Create and Crack Password Hashes

Department of Information Technology


Government College Women University Faisalabad

Goal: Understand how password hashing works and how weak passwords are cracked
Hashing
Hashing is a one-way process that converts any input (like a password) into a fixed-
length string of characters, called a hash. It is used to securely store passwords and
other sensitive data. It’s one-way: You can turn data into a hash, but you can’t turn the
hash back into the original data.

Common hash functions:


MD5
It’s an old and fast hash function. But it's not safe anymore.
SHA-1
It’s better than MD5, but still not safe enough now.
SHA-256
This is a modern and secure hash function. It’s very strong and widely used. Good
choice for general secure hashing.
Bcrypt
It’s made especially for passwords. It is very secure because it is slow, which makes it
hard for hackers to guess passwords.

Purpose of hashing

 Security against Data leaks hashing helps protect data (especially passwords)
even if a database is leaked.

 Irreversible nature hashing is designed to be one-way (you can't reverse it to get


original data), which makes it secure.

 Faster verification hashes are short and fixed-length, making comparisons fast.

Cracking
Cracking means trying to guess the original data (like a password) from a hash. This
is done by generating possible passwords, hashing them, and comparing the result
with the target hash.

Types of cracking

 Brute Force: Try every possible password.


 Dictionary Attack: Try common passwords from a wordlist.
 Rainbow Table Attack: Use precomputed tables of hashes for quick lookup.
 Goal of Cracking: Find the original password that created the hash.

Step . 1
Open Google in the new tab
.

Step . 2
Search Hash Generator

Step . 3
Open 1st link
Step . 4
Now type password and click generate.
Step . 5
Generate the hash password
Enter password Cyber#123

Process of password cracking


Step . 1
Search crackstation
Step . 2
Copy hash funtion and paste in Crackstation

How weak passwords are cracked?


Weak passwords are cracked by using special software that quickly guesses many
possible passwords until it finds the right one. This is called a brute-force attack or
dictionary attack, depending on the method used. Weak passwords are easy to guess
because they are short, common, or use simple patterns.

You might also like