{"id":350,"date":"2025-11-30T23:17:07","date_gmt":"2025-11-30T23:17:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dberr012\/?p=350"},"modified":"2025-11-30T23:17:07","modified_gmt":"2025-11-30T23:17:07","slug":"cyse270-assignment-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dberr012\/2025\/11\/30\/cyse270-assignment-5\/","title":{"rendered":"CYSE270 Assignment 5"},"content":{"rendered":"\n<p><strong>Task A \u2013 Password Cracking<\/strong><\/p>\n\n\n\n<p><strong>1. Create 6 users in your Linux Terminal, then set the password for each user that<\/strong><\/p>\n\n\n\n<p><strong>meets the following complexity requirements respectively. You should list the<\/strong><\/p>\n\n\n\n<p><strong>passwords created for each user. [6 * 5 = 30 points].<\/strong><\/p>\n\n\n\n<p><strong>1. For user1, the password should be a simple dictionary word (all lowercase)<\/strong><\/p>\n\n\n\n<p><strong>2. For user2, the password should consist of 4 digits.<\/strong><\/p>\n\n\n\n<p><strong>3. For user3, the password should consist of a simple dictionary word of any<\/strong><\/p>\n\n\n\n<p><strong>length characters (all lowercase) + digits.<\/strong><\/p>\n\n\n\n<p><strong>4. For user4, the password should consist of a simple dictionary word<\/strong><\/p>\n\n\n\n<p><strong>characters (all lowercase) + digits + symbols.<\/strong><\/p>\n\n\n\n<p><strong>5. For user5, the password should consist of a simple dictionary word (all<\/strong><\/p>\n\n\n\n<p><strong>lowercase) + digits.<\/strong><\/p>\n\n\n\n<p><strong>6. For user6, the password should consist of a simple dictionary word (with a<\/strong><\/p>\n\n\n\n<p><strong>combination of lower and upper case) + digits + symbols.<\/strong><\/p>\n\n\n\n<p><strong>Remember, do not use the passwords for your real-world accounts.<\/strong><\/p>\n\n\n\n<ul>\n<li><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/e5597182-f6ff-410f-889e-5cd062293fe5\" width=\"624\" height=\"391\"><\/li>\n<\/ul>\n\n\n\n<p><strong>2. Export above users\u2019 hashes into a file named xxx.hash (replace xxx with your<\/strong><\/p>\n\n\n\n<p><strong>MIDAS name) and use John the Ripper tool to crack their passwords in wordlist<\/strong><\/p>\n\n\n\n<p><strong>mode (use rockyou.txt). [ 40 points]<\/strong><\/p>\n\n\n\n<ul>\n<li><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/313535e2-4494-4e97-9018-85c65c0750c0\" width=\"624\" height=\"391\"><\/li>\n<\/ul>\n\n\n\n<p><strong>3. Keep your john the ripper cracking for 10 minutes. How many passwords have been<\/strong><\/p>\n\n\n\n<p><strong>successfully cracked? [30 points]<\/strong><\/p>\n\n\n\n<ul>\n<li><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/871b75ba-d78c-44e0-aa71-f579f4dc2b5a\" width=\"624\" height=\"391\"><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Task A \u2013 Password Cracking 1. Create 6 users in your Linux Terminal, then set the password for each user that meets the following complexity requirements respectively. You should list the passwords created for each user. [6 * 5 = 30 points]. 1. For user1, the password should be a simple dictionary word (all lowercase)&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dberr012\/2025\/11\/30\/cyse270-assignment-5\/\">Read More<\/a><\/div>\n","protected":false},"author":30971,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts\/350"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/users\/30971"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/comments?post=350"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts\/350\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts\/350\/revisions\/351"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/media?parent=350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/categories?post=350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/tags?post=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}