Passwords Lab
In this lab, you will write code to recover passwords from hashes and apply it to recover as many passwords as possible. In addition to describing the lab tasks, the Lab Instructions provide a tutorial on password recovery using Python.
In addition to the lab instructions, you will need the following files:
- Hashes to attack in Pyton format ‐ hashes.py
- The first 100,000 entries from the RockYou dictionary for use in your attacks ‐ rockyou_100000_txt.zip
- Hashes of the first 100,000 entries from the RockYou dictionary for use in your attacks ‐ rockyou_100000_hash.zip
Graduate students (CMSC 626) and ambitious undergraduates will need the following files:
- Python code to build TMTO tables for a TMTO attack on the five-character random passwords ‐ build_table.py
- A zip file containing pre-built TMTO tables for attacking hashes of the five-character random passwords ‐ catalog.zip
Labs must be completed invidually. You are NOT permitted to work with a partner on the labs.
Lab reports and any required code must be submitted on Blackboard. Reports must be in PDF, DOC, or DOCX format; code may be submitted as text files. When your files are ready to submit, go to the "Labs" menu option on the CMSC 426 course page on Blackboard and click on lab title; you will be presented with an option to upload and submit your documents.