In summary, current alternatives to passwords are not
seemed to solve security problem and to replace passwords in near future. For
instance, graphical passwords do suffer from the same security threats as text
passwords. However, the most common problem of alternative authentication
approaches is low deployability. There are a number of devices that cannot
support biometrical authentication such as stationary desktops without webcam
and other equipment, except a keyboard and a mouse. The most effective way of
authentication may be developed by combination of different approaches of
authentication and introducing two and three step verifications, but ultimately
passwords are here to stay.
In the following blogpost the way I used software called hashcat in my project is described. The example of using this software for dictionary attack is demonstrated. In my work I used information provided by Tavarez (2020) . According to Porup (2020) hashcat is one of the most popular password crackers all around the world. Moreover, hashcat is included in the list of basic tools in Kali linux – linux distribution widely used by cybersecurity specialists. I installed Kali linux virtual machine in order to use this program and to show the example of a dictionary attack (Author's screenshot) However, before looking at the examples of using hashcat on practise, it is useful to understand in which areas hashcat is using. In plain words, hashcat is a password guesser which includes a number of features and pre-installed functionalities for cracking passwords by penetrating brute-force and dictionary attacks. The way it works is not too sophisticated, it hashes considerable numbe...
Comments
Post a Comment