Cyber Security(Password Cracking Presentation).pptx

1,579 views 14 slides Mar 19, 2024
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

My Presentation on Cyber Security Password Cracking


Slide Content

Password Cracking Enrollment No:- 210303145029

Contents Introduction What is password Password cracking techniques Defend against password cracking of system Conclusion

Password cracking is a cybersecurity technique used to gain unauthorized access to computer systems, networks, or online accounts by attempting to guess or decrypt passwords. It is one of the oldest hacking arts. Every system must store passwords somewhere in order to authenticate users. Password crackers use techniques like brute-force attacks, dictionary attacks, phishing, malware, rainbow tables, and guessing to crack passwords Introduction

A password is a secret sequence of characters or symbols used to authenticate a user's identity and grant access to a computer system, network, or online account. Comprises : [a-z,A-z,0-9,@,$ etc.] What is password

Brute Force attack Dictionary attack Rainbow-Table attack Phishing Keylogging Guessing etc. Password cracking techniques

Brute Force attack This technique involves trying every possible combination of characters until the correct password is found. Brute force attacks are resource-intensive and time-consuming but can be effective if the password is weak or short Password cracking techniques

(2) Dictionary attack In this method, a list of commonly used passwords or words from a dictionary is used to attempt to gain access to an account. These lists can be created manually or obtained from previous data breaches. Password cracking techniques

(3) Rainbow-table attack Rainbow tables are precomputed tables used for reversing cryptographic hash functions to obtain the plaintext password from its hash. This technique can significantly speed up the process of password cracking, especially for weaker passwords. However, it requires a considerable amount of storage space to store the tables. Password cracking techniques

(4) Phishing Phishing involves tricking users into providing their passwords by posing as a legitimate entity, such as a bank or a social media platform. Phishing attacks often use deceptive emails, websites, or messages to trick users into entering their login credentials. Password cracking techniques

(5) Keylogging Keyloggers are malicious software or hardware that record keystrokes on a computer or device. Attackers can use keyloggers to capture passwords as users type them, without their knowledge. Password cracking techniques

(6) Guessing Sometimes, attackers can successfully guess passwords based on personal information about the target, such as their name, birthday, or interests. Keyloggers are malicious software or hardware that record keystrokes on a computer or device. Password cracking techniques

Defend against password cracking of system

In conclusion, password cracking is a persistent threat, but by implementing strong security practices and promoting user awareness, we can significantly reduce its effectiveness and protect our digital assets. Conclusion
Tags