User:Kopaka649/Experimental Data
A Day of Cracking (Page 1)
To simulate the threat of password exploitation in the real world, we have conducted a series to tests. Each is designed to recreate a real life scenario.
Test Setup (Page 2)
The multifunction password recovery program “Cain and Abel” was our tool. As it was one of a few freeware apps, that made it very attractive. Cain does a comprehensive job, able to launch all kinds of attacks from brute force, to dictionary attack to rainbow tables. It was installed on two fairly modern PCs.
Comp 1: Intel Pentium 4 2.8 ghz w/ Hyper-Threading Comp 2: AMD64 3800X2 (dual core)
Both feature fairly modern processors and have multitasking abilities
Test 1: Windows Password
We encoded the word “sponge” in NTLM hash, and launched brute force attacks with an alphanumeric character set. Intel: 1:01:347 AMD: 1:03:122
Both whizzed through very quickly, cracking at an average 5,600,000 combinations a second, coming up with the password in just over a minute.
Test 2: Web Account
Assuming one knows the login,