Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Work

Assignment

60 points

Instruction:

· Show your own work (at least 50% penalty otherwise)

· Submit
(1) a single word document containing the source code (copied from the source program file) of your program and screenshot of the program run including the number of words tested.

· Submit
source program files (e.g.,checker.py) and a Word document containing the plaintext password found, the number of words tested, and the screenshot capturing the program run and the password found, and the source code (copied from the source program file)

· Make sure you submit the intended one. It is recommended that you download what has been uploaded and double-check if the correct document has been submitted.

· You can submit as many times as you want, but the last submission will only be graded. If the last submission is made after the deadline, there will be a late submission penalty.

· No plagiarism: Do not copy and paste any from textbooks and other resources to answer questions (Zero points will be given otherwise).

· No resubmission/extension request will be accepted.

Problem 1. Linux File Permissions (20 pt., 4 pt. each)

For each permission requirement below, provide (1) symbolic permission and (2) 4-digit octal (numeric) permission.

a. For a file named “a.png”,

· Owner: can read and write

· Group: can read and write

· World: forbidden

Symbolic permission?

Numeric permission?

b. For a directory of “dir1”,

· Owner: can read, write, and execute

· Group: can read and execute

· World: can read and execute

Symbolic permission?

Numeric permission?

c. For a file named “passwd”,

· Owner: can read, write, and execute

· Group: can read and execute

· World: can read and execute

· Set user ID bit enabled

Symbolic permission?

Numeric permission?

d. For a directory of “dir2”,

· Owner: can read, write, and execute

· Group: can read, write, and execute

· World: can read, write, and execute

· Sticky bit enabled

Symbolic permission?

Numeric permission?

e. For a file of “b.txt”,

· Owner: can read, write, and execute

· Group: can read, write, and execute

· World: can read and execute

· Set group ID bit enabled

Symbolic permission?

Numeric permission?

Problem 2. (10 pt.) Password Strength Checker

What makes a strong password?

Strong passwords have many different attributes:

· Length – typically > 8 characters

· Case – contain both uppercase and lowercase letters

· Special characters – contain at least one special character (e.g., !, %,@)

· Numbers – contain one or more numbers

· Additionally, your password should never contain any personal information (like your birthday, middle name).

Develop a Python or C++ program that can check the strength of a password. There are a few requirements for the program.

Requirements

· Take user input (the password to be tested)

· Calculate a score based on the contents of the password

· Tell the user the score of their password

· Tell the user the strength of their password (Weak, Moderate, Strong)

Below is a python program snippet for reference.

# Get user’s password to check

userPassword = input(“What is your password: “)

# Set a baseline for the possible counts of each character type

# Loop through each character and see what type it is

# Calculate the score of the password

# Tell the user how strong their password is

Problem 3. Password Brute-force Attack (30 pt.)

Write a program that performs the brute-force attack to break the password. The following table shows encrypted passwords using the crypt() function. Your mission is to break the password corresponding to your CWID in the table. For example, the last digit of your CWID is 1, then you should identify the password for indBOW06MoVz6.

In this case my last number is 7.

Last digit of CWID

Encrypted password

1

indBOW06MoVz6

2

in79RsnfG/VWo

3

inbqJM0dLgWvo

4

incT1ji3YqQ/Y

5

in7haMV00ylgk

6

in1U0tb9WpIcI

7

inPlXS.yNKivQ

8

inqidvfWapJp2

9

injY7hdQJTeu2

0

inQW.HgtuEe.M

Crypt() is a function to check UNIX/LINUX passwords, and the encrypted passwords above are encoded by the standard crypt() function. Hence, you should use the crypt() function to break the password. The crypt() function takes two input parameters and returns the encrypted password, as follows:

Input parameters:

· Password (plaintext): string

· Salt: string

Output:

· Encrypted password: string

The password length is six and the salt is set to ‘infosec’ (without using the quotation mark). For the brute-force attack, you should try 6-character lower case letters of alphabet from ‘aaaaaa’, ‘aaaaab’, ‘aaaaac’, …, to ‘zzzzzz’, with the salt. Report the original plaintext password by breaking the encrypted password (one based on your CWID). Also report how many words you tested to find the original password.

It is recommended to write a program using either Python or C/C++. While there are numerous resources for referencing crypt(), the following shows just two of them (but you can refer to any other helpful resources).

· Python:



· C:







pages/man3/crypt.3.html

Below is a python program snippet for reference.

# Please show the pycharm inside our VM with Kali Linux to do the coding

# import the following modules import pwd

import crypt

#usage and sample output password = “computer”

salt=”science”

crypt.crypt(password, salt)

Output is:

‘scRKJfdmHndxk’

Finally, submit the following:

· Screenshot showing the program running, the key found, and the number of words tested: 10 pts.

· Source code in the document: 10 pts.

· Source programming file (must be compliable and executable): 10 pts.

1

1

1

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Deliverable 2 – Develop an Advocacy Report

  Scenario You are the director of community affairs for the health lobby organization, Pathways to a Healthy America. In 2010, President Barack Obama signed the Affordable Care Act into law. As a result, millions of Americans who were previously uninsured gained access to the healthcare system. One of the

D7

Research and find any free organizational culture quiz. Some free quiz sites are provided below, but feel free to search and use your own quiz. · Culture QuizLinks to an external site. · What’s Your Organizational Culture? Links to an external site. Take the quiz and then copy/paste your results into

W2

Team Effectiveness in the Workplace Instructions Teams and their use in organizations seem to have varying degrees of success. We all know what a successful athletic team looks like. Managers often times try to translate that structure and in turn success back to the organization by organizing their employees in

4.2222

  Watch the “Lack of Commitment” video. on Youtube Post your response in a conversational tone and narrative form. When there is not a natural consensus- can you disagree as individuals and commit as a team? What Scriptures or other faith-based references support this concept? 

Virtual Teams

 What are some challenges managers face when communicating with virtual teams? 

ADD TO RESUME

KRYSTEL BERGHER PROFILE Accomplished Customer Service Expert committed to the delivery of quality service. Professional and Ethical. Seeking to assist or help a new customer service department in creating and achieving the much-needed customer service goals. CONTACT ADDRESS: 15851 Southwest 139th Place, Miami FL 33177. PHONE: 305-992-6010 EMAIL: [email protected] om

Economic & Marketing

Homework  Sustainability, Social Impact, and the Bottom Line Think about a product or service you recently purchased that originated from a company whose Mission includes a focus on sustainability or social impact. In other words, a company that “does well by doing good.“ Then read and reply to each of the prompts

BUS 3301 Unit VII Q12

Business Law BUS 3301 VII Question 12 The principal agent relationship, the employer-employee relationship, and the employer-independent contractor relationship are three types of agency relationships commonly found in business settings. Why is it important for business professionals to know what type of agency relationship they are forming?   Your response must

ITC_3303 E

Information Systems Management ITC 3301 Unit VII Essay In this final assignment, you will develop a paper that reviews some of the main topics covered in the course. Compose an essay to address the following: · Identify the components of an information system using the five-component framework and provide a

BUS 3301 Unit VII Q11

Business Law BUS 3301 VII Question 11 Have you ever bought something, paid for it, and arranged to have it delivered to you at a later date? That is a fairly typical transaction, and, under the Uniform Commercial Code (UCC), a delivery contract is created. However, it is a little

case

  1. How did Apple’s introduction of the IPhone in 2007 lead to its success over its main competitors? Think about which industries it has disrupted and how. 2. What are some the challenges facing Apple today? What should Apple do to address them? Be Specific.

Enviromental Analysis

Creating a mission vision instruction and an organizational chart Creating an Organization Chart BUS 100 Introduction to Business Organization Chart Instructions Organization Chart Create a hierarchy (think inverted tree) with the top decision maker at the top. Identify the different levels of management down to non-management roles. Determine if you

Strategic Financial Management

Project Overview: In the previous project part, you developed a flexible (flex) budget based on an unforeseen expense provided to you by your professor. For this project part, you will take things one step further by determining ways to reduce spending in different areas or aspects of your business.  Using

Strategic Financial Management

Project Overview: In the previous project part, you developed a flexible (flex) budget based on an unforeseen expense provided to you by your professor. For this project part, you will take things one step further by determining ways to reduce spending in different areas or aspects of your business.  Using

Please see attached – need in 24 hrs

Select 1 well-known business you would like to research and use as the basis for developing a marketing campaign. Refer to the following resources, as needed, for assistance selecting a business and locating information about it: · Marketing professional organizations, such as  4 A’s  website or  American Marketing Association  website  

CJ 2500 MOD 6 FINAL

INSTRUTIONS ATTACHED TOPIC TO DISCUSS How gps tracking units placed on cars can be obtained by law enforcement consistent with the 4th amendment and how such devices can help criminal investigations? Remember there must be critical analysis from you I the paper and not just a book report. Overview: A

week 3 pending

pfa TASK 1: By Tuesday Evening Reflection and Discussion Forum Week 3 Assigned Readings: Chapter 8. Understanding Markets and Industry Changes. Chapter 9. Market Structure and Long-Run Equilibrium. Chapter 10. Strategy: The Quest to Keep Profit from Eroding. Initial Postings: Read and reflect on the assigned readings for the week.