Chapter 5 Results

Chapter 5 Results

CHAPTER 5 RESULTS 5.1 Results This chapter will discuss the results of the testing and comparison of the password cracking tools used. This chapter can be summarized as follows: • Research Data and Result Analysis (Locally) • Research Data and Result Analysis (Remotely) • Research Data and Result Analysis (Alphabets only) • Research Data and Result Analysis (Alphabets and a special character) 5.2 Research Data and Result Analysis (Locally) In Figure 16, Ophcrack was used to crack the local users' password with different combinations of password, alphabets, alphanumeric, alphanumeric special characters, english and non-english words. In Figure 17, Ophcrack was used to crack the same password, but excluding the 3 password that were not cracked in the previous attempt. In Figure 18, Cain was used to crack the local users' password. 35 36 Figure 16 - Ophcrack cracked 7 of 10 passwords Figure 17 - Ophcrack cracked 7 of 7 passwords 37 Figure 18 - Cain cracked 5 of 10 passwords 5.3 Research Data and Result Analysis (Remotely) First, the author scans the network for active IP address with NMAP (Figure 19). He used the command of "nmap -O 192.168.1.1-254" to scan the network, it would scan each IP address for active computer. The command -O enabled operating system detection. From the result of the scanning, there were few ports in the state of open and the services that were using those ports, 135/TCP, 139/TCP, 445/TCP and 1984/TCP. Another important detail was the OS details; it showed that the computer was running under Microsoft Windows XP Professional SP2 or Windows Server 2003. 38 Figure 19 - Nmap Scanning the Network The next step was to find out what exploit could take over the target's system. The author used an exploit for port 445 (Figure 20), smb. Thus, he proceeded with exploit/windows/smb/ms08_067_netapi, and by choosing the payload windows/vncinject/reverse_tcp. He set the RHOST as his target, which is 192.168.1.111 and then exploit. Vncinject enabled the author to gain access of his target's desktop. A window showing the target's desktop appeared on top of the author's desktop and within the window, a command prompt (Metasploit Courtesy Shell) appeared. In Figure 21, it shows that the author has successfully entered the victim's desktop. 39 Figure 20 - Metasploit on Port 445 Figure 21 - Gained access of victim's desktop 40 By using the provided command prompt, the author initiated a FTP connection to his FTP server (Figure 22). After that, he retrieved pwdump.exe to the victim's C drive and executed the program to dump the target's registered users and password to a text file (Figure 22 & Figure 23). Then, he runs the pwdump.exe and dumps the password into a text file, pass.txt, by using the command, "pwdump localhost >> C:\pass.txt" (Figure 22 & Figure 23). Figure 22 - Initiated FTP connection, Sending PwDump, gaining hashed password 41 Figure 23 - Upload pwdump.exe and hashing username/password successfully Next, the author sent the text file to his FTP server (Figure 24 & Figure 25), and after that, he deleted both the pwdump.exe and hashed text file from the victim's C drive (Figure 26). Then, the author closed his session by closing any window he opened, including the command prompt. 42 Figure 24 - Sends pass.txt to FTP server Figure 25 - pass.txt retrieval success 43 Figure 26 - Remove Trace Finally, he loaded the text file to Ophcrack/Cain to crack the password (Figure 27 & Figure 28). It took Ophcrack 1minute 56 seconds to crack 9/14 passwords (Figure 29) and Cain 209.89seconds to crack 7/14 (Figure 30 & Figure 31). There were 4 users that were not registered by the owner, included for the cracking process, which were the Administrator, Guest, HelpAssistant and SUPPORT_388945a0. 44 Figure 27 - Ophcrack load hashes from text file Figure 28 - Cain import hashes from a text file 45 Figure 29 - Ophcrack Results 46 Figure 30 - Cain Results 1 Figure 31 - Cain Results 2 47 5.4 Research Data and Result Analysis (Alphabets Only) The author conducts a test for cracking password containing alphabets only, and the alphabetic words are dictionary words which were partially taken from Figure 7 and from a list provided by one of the password cracking tool. The formulas used are: • Mean = x = ( Σ xi ) / n 2 • Standard Deviation = s = sqrt [ Σ ( xi - x ) / ( n - 1 ) ] 2 2 • Variance = s = Σ ( xi - x ) / ( n - 1 ) 2 2 • Standard Error = SE = sqrt[(s1 /n1) + (s2 /n2)] 2 2 2 2 2 2 • Degrees of Freedom = DF = (s1 /n1 + s2 /n2) / { [ (s1 / n1) / (n1 - 1) ] + [ (s2 / 2 n2) / (n2 - 1) ] } • T-test = t = [ (x1 - x2) - d ] / SE Table 2 - Statistic table for alphabets only Length Ophcrack Cain T-test Found Time (seconds) Found Time (seconds) 4 10 Mean = 4.48 10 Mean = 4.337 7.6548E-1 Var = 3.80571 Var = 7.61456 s.d. = 1.95082 s.d. =2.75945 5 10 Mean = 3.52 10 Mean = 6.8128 1.68216976398E-9 Var = 7.1696 Var = 4.843 s.d. = 2.677610875 s.d. = 2.20068 6 10 Mean = 5.7 10 Mean = 4.4616 1.9401E-1 Var = 31.76531 Var = 12.96052 s.d. = 5.63607 s.d. = 3.60007 7 10 Mean = 1.68 10 Mean = 1.7362 7.2497E-1 Var = 1.20163 Var = 0.06095 s.d. = 1.09619 s.d. = 0.24687 8 10 Mean = 2.88 10 Mean = 4.6914 3.4E-4 Var = 3.45469 Var = 8.30515 s.d. = 1.85868 s.d. = 2.88187 48 9 10 Mean = 2.82 10 Mean = 4.6674 3.9E-4 Var = 3.94653 Var = 8.55873 s.d. = 1.98659 s.d. = 2.92553 10 10 Mean = 2.84 10 Mean = 4.8672 4.40199665947E-5 Var = 2.30041 Var = 8.58477 s.d. = 1.51671 s.d. = 2.92998 11 10 Mean = 6.86 10 Mean = 7.4176 6.1064E-1 Var = 30.28612 Var = 29.29407 s.d. = 5.50328 s.d. = 5.4124 12 10 Mean = 4.26 10 Mean = 3.2352 3.234E-2 Var = 8.60449 Var = 2.43638 s.d. = 2.93334 s.d. = 1.56089 13 10 Mean = 7.64 10 Mean = 3.084 4.50068284555E- Var = 17.13306 Var = 0.85168 10 s.d. = 4.13921 s.d. = 0.92287 14 10 Mean = 12.08 10 Mean = 4.6182 6.97384112681E- Var = 29.21796 Var = 15.46989 12 s.d. = 5.40536 s.d. = 3.93318 5.5 Research Data and Result Analysis (Alphabets and a Special Character) The author conducts a test for cracking password containing alphabets and a special character, and the alphabetic words are dictionary words which were partially taken from Figure 7 and from a list provided by one of the password cracking tool. The formulas used are: • Mean = x = ( Σ xi ) / n 2 • Standard Deviation = s = sqrt [ Σ ( xi - x ) / ( n - 1 ) ] 2 2 • Variance = s = Σ ( xi - x ) / ( n - 1 ) 2 2 • Standard Error = SE = sqrt[(s1 /n1) + (s2 /n2)] 2 2 2 2 2 2 • Degrees of Freedom = DF = (s1 /n1 + s2 /n2) / { [ (s1 / n1) / (n1 - 1) ] + [ (s2 / 2 n2) / (n2 - 1) ] } • T-test = t = [ (x1 - x2) - d ] / SE 49 Table 3 - Statistic table for alphabets and a special character Length Ophcrack Cain T-test Found Time (seconds) Found Time (seconds) 4 10 Mean = 7.16 0 Mean = 33.8314 2.39468945016E- Var = 4.05551 Var = 0.07353 58 s.d. = 2.01383 s.d. = 0.27117 5 0 Mean = 44.14 0 Mean = 36.9318 9.36869014996E- Var = 4.04122 Var = 1.09993 35 s.d. = 2.01028 s.d. = 1.04877 6 0 Mean = 39.86 0 Mean = 36.5376 4.26701573269E- Var = 5.02082 Var = 6.40074 10 s.d. = 2.24072 s.d. = 2.52997 7 0 Mean = 39.2 0 Mean = 38.2094 4.85E-2 Var = 3.22449 Var = 8.99874 s.d. = 1.79569 s.d. = 2.99979 8 10 Mean = 1.98 0 Mean = 36.4222 1.81673893455E- Var = 0.46898 Var = 0.70351 130 s.d. = 0.68482 s.d. = 0.83876 9 10 Mean = 3 0 Mean = 38.4134 7.1936884387E-94 Var = 2.4898 Var = 4.27239 s.d. = 1.57791 s.d. = 2.06698 10 10 Mean = 3.14 0 Mean = 42.071 1.2521137269E-79 Var = 3.10245 Var = 8.29653 s.d. = 1.76138 s.d. = 2.88037 11 10 Mean = 7.44 0 Mean = 40.5632 1.08567317727E- Var = 2.53714 Var = 3.92749 93 s.d. = 1.59284 s.d. = 1.98179 12 0 Mean = 42.12 0 Mean = 45.5726 5.2E-4 Var = 21.94449 Var = 24.33547 s.d. = 4.68449 s.d. = 4.9331 13 0 Mean = 40.28 0 Mean = 38.6036 1.42149730494E- Var = 1.51184 Var = 0.44537 12 s.d. = 1.22957 s.d. = 0.66736 14 0 Mean = 39.4 0 Mean = 38.5034 6.67894422053E-5 Var = 1.34694 Var = 0.96319 s.d. = 1.16058 s.d. = 0.98142 .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    15 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us