22 the ophcrack application is now launched and the

This preview shows page 22 - 24 out of 24 pages.

22 The Ophcrack application is now launched and the two rainbow tables provided under the Cyb670 Project resources folder were downloaded. Figure 29 below shows both tables successfully downloaded and are enabled as depicted by the green radio button next to the table name. Figure 29. The two rainbow tables showing as enabled in Ophcrack. Once the tables are enabled, the passwords can be cracked. In Ophcrack select Load from the Menu bar, single hash, and when prompted in a pop-up paste the password hash acquired in the previous steps to crack TestAccount1 password. Figure 30 and 30a below shows the cracked password for the first and second test accounts created. Figure 30. TestAccount1 password cracked using Ophcrack.
PROJECT 1: PREPARATORY LAB EXERCISES 23 Figure 30a. TestAccount2 password cracked using Ophcrack. Conclusion All the tools used in this report are key to maintaining a well-rounded secure network apparatus. A lot of the tools heavily rely on the experience of the user. It is imperative proper training and knowledge of how to use these tools is well understood by the user. Combined, the tools and applications provide security baseline, defensive measures, monitoring, and ransomware attack mitigation techniques. To be successful, the user must have a basic understanding of how computers communicate. These tools and applications are extremely helpful, but will produce no results if the user does not know what he/she is looking at.
PROJECT 1: PREPARATORY LAB EXERCISES 24 References UMUC, (2019). Project 1 scenario transcript. Retrieved from: 1537c-cf00-40b5-ba60-13b5973b95a7/1/Project1ScenarioTranscript.html

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture