Cyber Security Assignment
Participant's Name: Maida
Participant ID: 25
Supervisor
Mam Kinza Noor
Topic Name: Create and Crack Password Hashes
Department of Information Technology
Government College Women University Faisalabad
Goal: Understand how password hashing works and how weak passwords are cracked
Hashing
Hashing is a one-way process that converts any input (like a password) into a fixed-
length string of characters, called a hash. It is used to securely store passwords and
other sensitive data. It’s one-way: You can turn data into a hash, but you can’t turn the
hash back into the original data.
Common hash functions:
MD5
It’s an old and fast hash function. But it's not safe anymore.
SHA-1
It’s better than MD5, but still not safe enough now.
SHA-256
This is a modern and secure hash function. It’s very strong and widely used. Good
choice for general secure hashing.
Bcrypt
It’s made especially for passwords. It is very secure because it is slow, which makes it
hard for hackers to guess passwords.
Purpose of hashing
Security against Data leaks hashing helps protect data (especially passwords)
even if a database is leaked.
Irreversible nature hashing is designed to be one-way (you can't reverse it to get
original data), which makes it secure.
Faster verification hashes are short and fixed-length, making comparisons fast.
Cracking
Cracking means trying to guess the original data (like a password) from a hash. This
is done by generating possible passwords, hashing them, and comparing the result
with the target hash.
Types of cracking
Brute Force: Try every possible password.
Dictionary Attack: Try common passwords from a wordlist.
Rainbow Table Attack: Use precomputed tables of hashes for quick lookup.
Goal of Cracking: Find the original password that created the hash.
Step . 1
Open Google in the new tab
.
Step . 2
Search Hash Generator
Step . 3
Open 1st link
Step . 4
Now type password and click generate.
Step . 5
Generate the hash password
Enter password Cyber#123
Process of password cracking
Step . 1
Search crackstation
Step . 2
Copy hash funtion and paste in Crackstation
How weak passwords are cracked?
Weak passwords are cracked by using special software that quickly guesses many
possible passwords until it finds the right one. This is called a brute-force attack or
dictionary attack, depending on the method used. Weak passwords are easy to guess
because they are short, common, or use simple patterns.