Artifact Overview
This artifact is based on a hands-on cybersecurity assignment focused on analyzing password security weaknesses across Linux and Windows systems. The goal of the assignment was to understand how weak authentication practices can be exploited and how attackers leverage password cracking techniques, in order to better defend against them.
The work was completed in controlled virtual environments using Kali Linux and Windows virtual machines.
What I Did
In this assignment, I performed a series of controlled security experiments that demonstrated how password vulnerabilities can be exploited when weak credentials or insecure configurations are used.
Key tasks included:
- Creating user accounts and groups in Linux and Windows environments
- Assigning passwords of varying complexity to evaluate strength
- Extracting password hashes from both Linux and Windows systems
- Performing dictionary and brute-force attacks using industry tools
- Analyzing the results to determine which passwords were successfully cracked and why
All testing was conducted in a lab environment using non-production credentials.
Tools & Techniques Used
- Linux: User/group management, password hashing analysis
- Windows: User creation, hash extraction
- Password Cracking Tools:
- John the Ripper (dictionary attacks)
- Cain & Abel (brute-force and dictionary attacks)
- Wireless Security Analysis:
- Aircrack-ng
- Wireshark (EAPOL and WPA2 traffic analysis)
These tools are commonly referenced in cybersecurity education and are used by security professionals to evaluate authentication risks.
Key Security Concepts Demonstrated
This artifact demonstrates understanding of several core cybersecurity concepts:
- Password hashing and authentication mechanisms
- Dictionary vs. brute-force attack techniques
- Why weak or predictable passwords are vulnerable
- The importance of strong password policies and secure credential storage
- Defensive use of offensive tools to assess system security
By cracking selected passwords, I was able to see firsthand how attackers exploit poor password hygiene and why layered defenses are critical.
Why This Artifact Supports My Career Goals
This artifact supports my interest in cybersecurity analyst and SOC-related roles by demonstrating practical experience with authentication security and threat analysis. Understanding how attackers compromise credentials is essential for defending systems, identifying risks, and recommending stronger security controls.
Including this artifact in my ePortfolio highlights my ability to work with real security tools, analyze results, and think from both an attacker and defender perspective—skills that are highly relevant to cybersecurity operations and incident response roles.
Reflection
Completing this assignment strengthened my understanding of how authentication weaknesses are exploited in real-world attacks. It reinforced the importance of strong password policies, monitoring for credential-based attacks, and implementing preventative controls. This experience helped me connect theoretical security concepts to practical system vulnerabilities and defensive strategies.