Hj Cyber security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Department of Bachelor of Science (Computer

Science)
Name: Harish Jagdale
Roll no.: BCS22
Class: S.Y.BSC (CS).
Div: A
Subject: Cyber Security
Sub. Teacher: Prof. Amit Haridas Sir.
• CONTESTS •

Introduction
What is password ?
Password cracking techniques
Defend against password cracking of system
• Conclusion
INTRODUCTION

Password cracking is a cybersecurity technique used to gain


unauthorized access to computer systems, networks, or online
accounts by attempting to guess or decrypt passwords.

• It is one of the oldest hacking arts. Every system must store


passwords somewhere in order to authenticate users.

Password crackers use techniques like brute-force attacks, dictionary


attacks, phishing, malware, rainbow tables, and guessing to crack
passwords
WHAT IS PASSWORD?

A password is a secret sequence of characters or symbols used


to authenticate a user’s identity and grant access to a computer
system, network, ог online account.
Comprises:
• [a-z,A-z,0-9,@,$ etc.]
Password Cracking Techniques

Brute Force attack


Dictionary attack
Rainbow-Table attack
Phishing
Keylogging
1. Guessing etc
Brute Force Attack
(1) Brute Force attack
This technique involves trying
every possible combination of
characters until the correct
password is found. Brute force
attacks are resource- intensive
and time-consuming but can
be effective if the password is
weak or short
Dictionary Attack
(2) Dictionary attack
In this method, a list of commonly
used passwords or words from a
dictionary is used to attempt to
gain access to an account.
These lists can be created
manually or obtained from
previous data breaches.
Rainbow Table Attack
3) Rainbow-table attack
Rainbow tables are precomputed tables used
for reversing cryptographic hash functions to
obtain the plaintext password from its hash.
This technique can significantly speed up the
process of password cracking, especially for
weaker passwords.
However, it requires a considerable amount of
storage space to store the tahles
Phishing
Phishing involves tricking users
into providing their passwords
by posing as a legitimate entity,
such as a bank or a social media
platform.
Phishing attacks often use
deceptive emails, websites, or
messages to trick users into
entering their login credentials.
KeyLogging
5) Keylogging
Keyloggers are malicious
software or hardware that
record keystrokes on a
computer or device.
Attackers can use keyloggers
to capture passwords as users
type them, without their
knowledge.
GUESSING
(6) Guessing
Sometimes, attackers can
successfully guess passwords
based on personal information
about the target, such as their
name, birthday, or interests.
Keyloggers are malicious
software or hardware that
record keystrokes on a computer
or device.
Defend against password cracking
of system
Conclusion
• In conclusion, password cracking is a persistent threat,
but by implementing strong security practices and
promoting user awareness, we can significantly reduce its
• effectiveness
Weak passwordsand remain
protectaour digital
major assets.
vulnerability in
cybersecurity. Emphasizing the use of complex and
unique passwords
• Prioritize is essential.
cybersecurity awareness and
practices to safeguard sensitive information.

You might also like